Общая информация
Название GIAC Security Essentials GSEC
Тип
Размер 2.85Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 195б
001. GIAC Security Essentials (GSEC) Introduction.mp4 9.21Мб
001. GIAC Security Essentials (GSEC) Introduction en.srt 1.84Кб
001. GIAC Security Essentials (GSEC) Summary.mp4 6.56Мб
001. GIAC Security Essentials (GSEC) Summary en.srt 1.59Кб
001. Learning objectives.mp4 3.63Мб
001. Learning objectives.mp4 3.02Мб
001. Learning objectives.mp4 3.00Мб
001. Learning objectives.mp4 2.75Мб
001. Learning objectives.mp4 2.71Мб
001. Learning objectives.mp4 2.60Мб
001. Learning objectives.mp4 2.58Мб
001. Learning objectives.mp4 2.56Мб
001. Learning objectives.mp4 2.55Мб
001. Learning objectives.mp4 2.50Мб
001. Learning objectives.mp4 2.48Мб
001. Learning objectives.mp4 2.41Мб
001. Learning objectives.mp4 2.39Мб
001. Learning objectives.mp4 2.39Мб
001. Learning objectives.mp4 2.37Мб
001. Learning objectives.mp4 2.29Мб
001. Learning objectives.mp4 2.29Мб
001. Learning objectives.mp4 2.23Мб
001. Learning objectives.mp4 2.21Мб
001. Learning objectives.mp4 2.16Мб
001. Learning objectives.mp4 2.14Мб
001. Learning objectives.mp4 2.13Мб
001. Learning objectives.mp4 2.07Мб
001. Learning objectives.mp4 2.06Мб
001. Learning objectives.mp4 2.01Мб
001. Learning objectives.mp4 1.88Мб
001. Learning objectives.mp4 1.86Мб
001. Learning objectives en.srt 538б
001. Learning objectives en.srt 492б
001. Learning objectives en.srt 299б
001. Learning objectives en.srt 681б
001. Learning objectives en.srt 400б
001. Learning objectives en.srt 411б
001. Learning objectives en.srt 399б
001. Learning objectives en.srt 402б
001. Learning objectives en.srt 334б
001. Learning objectives en.srt 488б
001. Learning objectives en.srt 423б
001. Learning objectives en.srt 501б
001. Learning objectives en.srt 560б
001. Learning objectives en.srt 567б
001. Learning objectives en.srt 495б
001. Learning objectives en.srt 494б
001. Learning objectives en.srt 485б
001. Learning objectives en.srt 437б
001. Learning objectives en.srt 424б
001. Learning objectives en.srt 411б
001. Learning objectives en.srt 408б
001. Learning objectives en.srt 400б
001. Learning objectives en.srt 383б
001. Learning objectives en.srt 381б
001. Learning objectives en.srt 357б
001. Learning objectives en.srt 357б
001. Learning objectives en.srt 331б
001. Module introduction.mp4 4.65Мб
001. Module introduction.mp4 4.59Мб
001. Module introduction.mp4 3.30Мб
001. Module introduction.mp4 3.05Мб
001. Module introduction.mp4 3.03Мб
001. Module introduction.mp4 2.55Мб
001. Module introduction en.srt 978б
001. Module introduction en.srt 956б
001. Module introduction en.srt 665б
001. Module introduction en.srt 648б
001. Module introduction en.srt 586б
001. Module introduction en.srt 576б
002. 1.1 Network Protocols and Reference Models.mp4 29.75Мб
002. 1.1 Network Protocols and Reference Models en.srt 8.17Кб
002. 10.1 Overview of Endpoint Security.mp4 23.67Мб
002. 10.1 Overview of Endpoint Security en.srt 6.31Кб
002. 11.1 Overview of Logging.mp4 30.01Мб
002. 11.1 Overview of Logging en.srt 12.04Кб
002. 12.1 Overview of Vulnerability Management.mp4 35.79Мб
002. 12.1 Overview of Vulnerability Management en.srt 9.15Кб
002. 13.1 Overview of Virtualization and VM Security.mp4 26.99Мб
002. 13.1 Overview of Virtualization and VM Security en.srt 7.99Кб
002. 14.1 Overview of Cryptology and Cryptosystems.mp4 26.81Мб
002. 14.1 Overview of Cryptology and Cryptosystems en.srt 7.48Кб
002. 15.1 Digital Signatures.mp4 14.12Мб
002. 15.1 Digital Signatures en.srt 6.29Кб
002. 16.1 The Importance of Written Security Policies.mp4 18.22Мб
002. 16.1 The Importance of Written Security Policies en.srt 4.70Кб
002. 17.1 Overview of Risk Management.mp4 31.81Мб
002. 17.1 Overview of Risk Management en.srt 8.66Кб
002. 18.1 Fundamentals of Incident Handling.mp4 14.81Мб
002. 18.1 Fundamentals of Incident Handling en.srt 4.39Кб
002. 19.1 Business Continuity Planning (BCP).mp4 25.79Мб
002. 19.1 Business Continuity Planning (BCP) en.srt 7.65Кб
002. 2.1 CIA Triad and Parkerian Hexad.mp4 10.59Мб
002. 2.1 CIA Triad and Parkerian Hexad en.srt 4.11Кб
002. 20.1 Operating Systems and Services.mp4 13.39Мб
002. 20.1 Operating Systems and Services en.srt 6.45Кб
002. 21.1 NTFS and Shared Folder Permissions.mp4 14.39Мб
002. 21.1 NTFS and Shared Folder Permissions en.srt 7.47Кб
002. 22.1 Security Templates and SCA Snap-in.mp4 15.84Мб
002. 22.1 Security Templates and SCA Snap-in en.srt 8.83Кб
002. 23.1 Azure and High Availability.mp4 28.68Мб
002. 23.1 Azure and High Availability en.srt 16.09Кб
002. 24.1 Windows PowerShell.mp4 37.59Мб
002. 24.1 Windows PowerShell en.srt 13.44Кб
002. 25.1 Comparing Linux Operating Systems.mp4 26.70Мб
002. 25.1 Comparing Linux Operating Systems en.srt 9.83Кб
002. 26.1 Starting Services at Boot Time.mp4 28.44Мб
002. 26.1 Starting Services at Boot Time en.srt 11.10Кб
002. 27.1 Configuring and Monitoring Logs.mp4 21.33Мб
002. 27.1 Configuring and Monitoring Logs en.srt 8.77Кб
002. 3.1 Access Control Concepts.mp4 84.39Мб
002. 3.1 Access Control Concepts en.srt 25.65Кб
002. 4.1 Network Topologies and Zones.mp4 29.14Мб
002. 4.1 Network Topologies and Zones en.srt 13.03Кб
002. 5.1 Introducing the Center for Internet Security (CIS).mp4 19.59Мб
002. 5.1 Introducing the Center for Internet Security (CIS) en.srt 4.79Кб
002. 6.1 The Evolution of IEEE 802.11 Security.mp4 60.59Мб
002. 6.1 The Evolution of IEEE 802.11 Security en.srt 16.35Кб
002. 7.1 Common Attack Types.mp4 71.03Мб
002. 7.1 Common Attack Types en.srt 25.34Кб
002. 8.1 Defense in Depth Overview and Strategies.mp4 20.96Мб
002. 8.1 Defense in Depth Overview and Strategies en.srt 6.96Кб
002. 9.1 Overview of Active Defense.mp4 19.01Мб
002. 9.1 Overview of Active Defense en.srt 7.83Кб
003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4 53.45Мб
003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6 en.srt 17.53Кб
003. 10.2 Host-based Intrusion Detection.mp4 11.82Мб
003. 10.2 Host-based Intrusion Detection en.srt 2.87Кб
003. 11.2 Logging System Setup and Configuration.mp4 15.60Мб
003. 11.2 Logging System Setup and Configuration en.srt 4.72Кб
003. 12.2 Network Scanning.mp4 40.69Мб
003. 12.2 Network Scanning en.srt 12.75Кб
003. 13.2 Cloud Models and Value Proposition.mp4 74.20Мб
003. 13.2 Cloud Models and Value Proposition en.srt 23.29Кб
003. 14.2 Cryptographic Hashing.mp4 25.56Мб
003. 14.2 Cryptographic Hashing en.srt 9.40Кб
003. 15.2 IPsec.mp4 44.01Мб
003. 15.2 IPsec en.srt 17.92Кб
003. 16.2 Standards, Guidelines, and Procedures.mp4 16.62Мб
003. 16.2 Standards, Guidelines, and Procedures en.srt 4.32Кб
003. 17.2 Risk Management Best Practices.mp4 32.03Мб
003. 17.2 Risk Management Best Practices en.srt 10.42Кб
003. 18.2 Six Step Incident Response Process.mp4 32.01Мб
003. 18.2 Six Step Incident Response Process en.srt 8.60Кб
003. 19.2 Business Impact Analysis (BIA).mp4 10.76Мб
003. 19.2 Business Impact Analysis (BIA) en.srt 3.62Кб
003. 2.2 Categories and Types of Controls.mp4 25.18Мб
003. 2.2 Categories and Types of Controls en.srt 6.50Кб
003. 20.2 Windows Workgroups vs. Domains.mp4 25.58Мб
003. 20.2 Windows Workgroups vs. Domains en.srt 15.29Кб
003. 21.2 Registry Keys and REGEDIT.EXE.mp4 11.93Мб
003. 21.2 Registry Keys and REGEDIT.EXE en.srt 6.13Кб
003. 22.2 Understanding Group Policy Objects.mp4 13.06Мб
003. 22.2 Understanding Group Policy Objects en.srt 8.20Кб
003. 23.2 Configuring Azure VM Attributes.mp4 24.87Мб
003. 23.2 Configuring Azure VM Attributes en.srt 13.17Кб
003. 24.2 Administrative Tools and Utilities.mp4 43.19Мб
003. 24.2 Administrative Tools and Utilities en.srt 12.89Кб
003. 25.2 Mobile Device Security.mp4 11.96Мб
003. 25.2 Mobile Device Security en.srt 6.40Кб
003. 26.2 Configuration Management Tools.mp4 16.52Мб
003. 26.2 Configuration Management Tools en.srt 7.98Кб
003. 27.2 Leveraging the Auditd tool.mp4 13.41Мб
003. 27.2 Leveraging the Auditd tool en.srt 4.76Кб
003. 3.2 Password Management.mp4 33.09Мб
003. 3.2 Password Management en.srt 10.12Кб
003. 4.2 Overview of Network Devices and Hardening.mp4 59.26Мб
003. 4.2 Overview of Network Devices and Hardening en.srt 22.48Кб
003. 5.2 Overview of CIS Controls.mp4 26.12Мб
003. 5.2 Overview of CIS Controls en.srt 8.98Кб
003. 6.2 WPA3 Security.mp4 13.73Мб
003. 6.2 WPA3 Security en.srt 4.77Кб
003. 7.2 CryptoMalware.mp4 32.35Мб
003. 7.2 CryptoMalware en.srt 12.85Кб
003. 8.2 Core Security Strategies.mp4 6.34Мб
003. 8.2 Core Security Strategies en.srt 4.49Кб
003. 9.2 Active Defense Techniques.mp4 18.47Мб
003. 9.2 Active Defense Techniques en.srt 4.80Кб
004. 1.3 Layer 4 Protocols.mp4 54.01Мб
004. 1.3 Layer 4 Protocols en.srt 19.54Кб
004. 10.3 Host-based Intrusion Prevention.mp4 13.95Мб
004. 10.3 Host-based Intrusion Prevention en.srt 3.75Кб
004. 11.3 Logging Analysis Fundamentals.mp4 18.68Мб
004. 11.3 Logging Analysis Fundamentals en.srt 7.11Кб
004. 12.3 Using Xenmap and Yersinia.mp4 33.56Мб
004. 12.3 Using Xenmap and Yersinia en.srt 19.64Кб
004. 13.3 Common Attacks Against Cloud Services.mp4 32.78Мб
004. 13.3 Common Attacks Against Cloud Services en.srt 9.73Кб
004. 14.3 Symmetric Key Cryptography.mp4 17.96Мб
004. 14.3 Symmetric Key Cryptography en.srt 4.65Кб
004. 15.3 SSLTLS.mp4 15.19Мб
004. 15.3 SSLTLS en.srt 3.89Кб
004. 16.3 Acceptable Use Policies.mp4 8.83Мб
004. 16.3 Acceptable Use Policies en.srt 1.91Кб
004. 17.3 Threat Assessment, Analysis, and Reporting.mp4 52.50Мб
004. 17.3 Threat Assessment, Analysis, and Reporting en.srt 17.73Кб
004. 18.3 Conducting a Forensic Investigation.mp4 37.57Мб
004. 18.3 Conducting a Forensic Investigation en.srt 18.28Кб
004. 19.3 Backups and Restoration.mp4 20.70Мб
004. 19.3 Backups and Restoration en.srt 4.29Кб
004. 2.3 Understanding the Enterprise Architecture.mp4 5.83Мб
004. 2.3 Understanding the Enterprise Architecture en.srt 2.49Кб
004. 20.3 Windows-as-a-Service.mp4 20.02Мб
004. 20.3 Windows-as-a-Service en.srt 6.55Кб
004. 21.3 Windows Privileges.mp4 17.35Мб
004. 21.3 Windows Privileges en.srt 6.03Кб
004. 22.3 Administrative Users, AppLocker, and User Account Control.mp4 13.75Мб
004. 22.3 Administrative Users, AppLocker, and User Account Control en.srt 6.98Кб
004. 23.3 Microsoft Azure Active Directory (MAAD).mp4 34.02Мб
004. 23.3 Microsoft Azure Active Directory (MAAD) en.srt 19.87Кб
004. 24.3 Windows Auditing and Forensics.mp4 23.88Мб
004. 24.3 Windows Auditing and Forensics en.srt 11.32Кб
004. 25.3 Linux Shells and Kernels.mp4 17.66Мб
004. 25.3 Linux Shells and Kernels en.srt 9.12Кб
004. 26.3 Linux Kernel Security.mp4 25.93Мб
004. 26.3 Linux Kernel Security en.srt 9.45Кб
004. 27.3 Linux Security Utilities.mp4 18.23Мб
004. 27.3 Linux Security Utilities en.srt 8.70Кб
004. 3.3 Introduction to Password Cracking.mp4 37.66Мб
004. 3.3 Introduction to Password Cracking en.srt 13.89Кб
004. 4.3 Survey of Security Devices and Wireshark.mp4 58.09Мб
004. 4.3 Survey of Security Devices and Wireshark en.srt 21.55Кб
004. 5.3 Samples and Case Studies.mp4 25.72Мб
004. 5.3 Samples and Case Studies en.srt 7.92Кб
004. 6.3 PAN, NFC, and 5G Concepts.mp4 15.19Мб
004. 6.3 PAN, NFC, and 5G Concepts en.srt 5.58Кб
004. 7.3 Defensive Strategies.mp4 24.70Мб
004. 7.3 Defensive Strategies en.srt 13.63Кб
004. 8.3 Defensible Network Architectures.mp4 14.61Мб
004. 8.3 Defensible Network Architectures en.srt 4.16Кб
004. 9.3 Active Defense Tools.mp4 34.70Мб
004. 9.3 Active Defense Tools en.srt 12.57Кб
005. 1.4 Setting up a Lab Environment.mp4 36.81Мб
005. 1.4 Setting up a Lab Environment en.srt 15.93Кб
005. 10.4 Next-generation Endpoint Security Solutions.mp4 15.57Мб
005. 10.4 Next-generation Endpoint Security Solutions en.srt 4.06Кб
005. 11.4 Core SIEM Activities.mp4 20.98Мб
005. 11.4 Core SIEM Activities en.srt 7.34Кб
005. 12.4 Penetration Testing.mp4 54.97Мб
005. 12.4 Penetration Testing en.srt 20.69Кб
005. 13.4 Introduction to Microsoft Azure IAM.mp4 42.38Мб
005. 13.4 Introduction to Microsoft Azure IAM en.srt 16.99Кб
005. 14.4 Asymmetric Key Cryptography.mp4 11.12Мб
005. 14.4 Asymmetric Key Cryptography en.srt 3.81Кб
005. 15.4 Public Key Infrastructure.mp4 44.22Мб
005. 15.4 Public Key Infrastructure en.srt 16.47Кб
005. 16.4 Survey of Sample Policies.mp4 40.88Мб
005. 16.4 Survey of Sample Policies en.srt 13.39Кб
005. 19.4 Disaster Recovery Planning (DRP).mp4 39.48Мб
005. 19.4 Disaster Recovery Planning (DRP) en.srt 11.02Кб
005. 2.4 Introduction to Threat Enumeration.mp4 11.00Мб
005. 2.4 Introduction to Threat Enumeration en.srt 4.22Кб
005. 21.4 Overview of BitLocker Drive Encryption.mp4 17.75Мб
005. 21.4 Overview of BitLocker Drive Encryption en.srt 8.56Кб
005. 25.4 Linux Permissions.mp4 26.06Мб
005. 25.4 Linux Permissions en.srt 13.97Кб
005. 26.4 Linux System Enhancers.mp4 21.02Мб
005. 26.4 Linux System Enhancers en.srt 7.11Кб
005. 4.4 Configuring Firewalls at Amazon Web Services.mp4 32.16Мб
005. 4.4 Configuring Firewalls at Amazon Web Services en.srt 19.32Кб
005. 6.4 The Internet of Things (IoT).mp4 19.57Мб
005. 6.4 The Internet of Things (IoT) en.srt 7.53Кб
006. 1.5 Using tcpdump and Wireshark.mp4 25.82Мб
006. 1.5 Using tcpdump and Wireshark en.srt 10.43Кб
006. 25.5 Linux User Accounts.mp4 24.12Мб
006. 25.5 Linux User Accounts en.srt 11.02Кб
006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp4 29.16Мб
006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall en.srt 17.47Кб
007. 4.6 Examining a Classic IPS Sensor Device.mp4 24.04Мб
007. 4.6 Examining a Classic IPS Sensor Device en.srt 10.26Кб
1 397.81Кб
10 794.23Кб
100 678.50Кб
101 177.82Кб
102 355.74Кб
103 421.33Кб
104 375.74Кб
105 719.29Кб
106 970.76Кб
107 989.06Кб
108 1007.71Кб
109 2.63Кб
11 1016.75Кб
110 251.67Кб
111 299.32Кб
112 408.39Кб
113 431.24Кб
114 447.04Кб
115 461.99Кб
116 464.59Кб
117 514.32Кб
118 529.69Кб
119 604.60Кб
12 834.40Кб
120 625.45Кб
121 628.50Кб
122 640.08Кб
123 725.47Кб
124 731.27Кб
125 790.16Кб
126 809.83Кб
127 864.61Кб
128 883.37Кб
129 890.27Кб
13 639.66Кб
130 947.86Кб
131 965.16Кб
132 1015.21Кб
133 126.15Кб
14 122.05Кб
15 313.19Кб
16 535.88Кб
17 347.78Кб
18 417.78Кб
19 440.34Кб
2 988.72Кб
20 197.80Кб
21 210.86Кб
22 303.88Кб
23 1000.81Кб
24 454.79Кб
25 933.99Кб
26 223.93Кб
27 668.52Кб
28 861.46Кб
29 992.17Кб
3 423.25Кб
30 1011.17Кб
31 192.84Кб
32 1017.71Кб
33 257.42Кб
34 864.16Кб
35 882.52Кб
36 322.95Кб
37 571.64Кб
38 10.86Кб
39 192.24Кб
4 762.86Кб
40 303.36Кб
41 896.62Кб
42 966.71Кб
43 68.63Кб
44 188.37Кб
45 219.53Кб
46 283.16Кб
47 428.16Кб
48 453.84Кб
49 839.84Кб
5 935.24Кб
50 128.27Кб
51 307.85Кб
52 898.45Кб
53 987.92Кб
54 121.50Кб
55 333.44Кб
56 684.31Кб
57 1003.22Кб
58 18.68Кб
59 38.30Кб
6 25.74Кб
60 304.48Кб
61 1005.18Кб
62 419.24Кб
63 440.63Кб
64 1010.23Кб
65 329.35Кб
66 539.01Кб
67 783.45Кб
68 796.62Кб
69 37.31Кб
7 1011.62Кб
70 254.12Кб
71 344.08Кб
72 666.46Кб
73 394.07Кб
74 492.82Кб
75 159.37Кб
76 404.52Кб
77 437.98Кб
78 824.77Кб
79 828.27Кб
8 561.93Кб
80 194.28Кб
81 400.76Кб
82 625.45Кб
83 902.93Кб
84 49.22Кб
85 257.36Кб
86 273.30Кб
87 607.59Кб
88 621.03Кб
89 958.01Кб
9 513.33Кб
90 38.20Кб
91 68.13Кб
92 187.80Кб
93 896.99Кб
94 3.02Кб
95 241.30Кб
96 415.34Кб
97 812.79Кб
98 170.83Кб
99 455.61Кб
TutsNode.net.txt 63б
Статистика распространения по странам
Тринидад и Тобаго (TT) 1
Израиль (IL) 1
Румыния (RO) 1
Южная Корея (KR) 1
Алжир (DZ) 1
Польша (PL) 1
Франция (FR) 1
Всего 7
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент