Общая информация
Название [FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
Тип
Размер 5.37Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[CourseClub.Me].url 122б
[CourseClub.Me].url 122б
[FreeCourseSite.com].url 127б
[FreeCourseSite.com].url 127б
[GigaCourse.Com].url 49б
[GigaCourse.Com].url 49б
001 2023-CC-Domain-1-Study-guide-by-ThorTeaches.com-v1.1.pdf 1.33Мб
001 2023-CC-Domain-2-Study-guide-by-ThorTeaches.com-v1.1.pdf 813.63Кб
001 2023-CC-Domain-3-Study-guide-by-ThorTeaches.com-v1.1.pdf 1.15Мб
001 2023-CC-Domain-4-Study-guide-by-ThorTeaches.com-v1.1.pdf 4.42Мб
001 2023-CC-Domain-5-Study-guide-by-ThorTeaches.com-v1.1.pdf 754.55Кб
001 2023-CC-Mnemonics-by-ThorTeaches.pdf 281.69Кб
001 Domain 1 recap Certified in Cybersecurity (CC)_en.srt 33.82Кб
001 Domain 1 recap Certified in Cybersecurity (CC).mp4 120.29Мб
001 Domain 1 - What we will be covering_en.srt 1.23Кб
001 Domain 1 - What we will be covering.mp4 10.44Мб
001 Domain 2 - What we will be covering_en.srt 1.22Кб
001 Domain 2 - What we will be covering.mp4 9.15Мб
001 Domain 3 - What we will be covering_en.srt 1.14Кб
001 Domain 3 - What we will be covering.mp4 7.58Мб
001 Domain 4 - What we will be covering_en.srt 1.03Кб
001 Domain 4 - What we will be covering.mp4 8.24Мб
001 Domain 5 - What we will be covering_en.srt 973б
001 Domain 5 - What we will be covering.mp4 6.41Мб
001 Introduction and download your free study guides_en.srt 1.13Кб
001 Introduction and download your free study guides.mp4 11.55Мб
001 Why you should want to get Certified in Cybersecurity_en.srt 9.30Кб
001 Why you should want to get Certified in Cybersecurity.mp4 18.05Мб
002 BCP - Business Continuity Planning - Part 1_en.srt 11.75Кб
002 BCP - Business Continuity Planning - Part 1.mp4 40.19Мб
002 Configuration Management_en.srt 11.48Кб
002 Configuration Management.mp4 15.25Мб
002 Connect with me on Social media and the Udemy ratings system_en.srt 2.79Кб
002 Connect with me on Social media and the Udemy ratings system.mp4 12.13Мб
002 Domain 2 recap Certified in Cybersecurity (CC)_en.srt 27.92Кб
002 Domain 2 recap Certified in Cybersecurity (CC).mp4 87.58Мб
002 Network Basics and Definitions - Part 1_en.srt 18.57Кб
002 Network Basics and Definitions - Part 1.mp4 44.54Мб
002 Physical Security - part 1_en.srt 19.05Кб
002 Physical Security - part 1.mp4 43.48Мб
002 Scheduling your exam and what to expect_en.srt 9.17Кб
002 Scheduling your exam and what to expect.mp4 42.74Мб
002 The differences between Information Security, IT Security, and Cybersecurity_en.srt 10.26Кб
002 The differences between Information Security, IT Security, and Cybersecurity.mp4 55.99Мб
003 BCP - Business Continuity Planning - Part 2_en.srt 20.68Кб
003 BCP - Business Continuity Planning - Part 2.mp4 31.03Мб
003 Domain 3 recap Certified in Cybersecurity (CC)_en.srt 21.09Кб
003 Domain 3 recap Certified in Cybersecurity (CC).mp4 88.62Мб
003 How to get the most out of my courses and the Udemy interface_en.srt 3.94Кб
003 How to get the most out of my courses and the Udemy interface.mp4 29.24Мб
003 Network Basics and Definitions - Part 2_en.srt 16.51Кб
003 Network Basics and Definitions - Part 2.mp4 38.86Мб
003 Patch Management_en.srt 21.45Кб
003 Patch Management.mp4 28.32Мб
003 Physical Security - part 2_en.srt 11.82Кб
003 Physical Security - part 2.mp4 43.88Мб
003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1_en.srt 11.24Кб
003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4 21.43Мб
003 What to expect on exam day and after_en.srt 13.70Кб
003 What to expect on exam day and after.mp4 33.22Мб
004 BCP - Business Continuity Planning - Part 3_en.srt 20.13Кб
004 BCP - Business Continuity Planning - Part 3.mp4 45.47Мб
004 Change Management_en.srt 21.25Кб
004 Change Management.mp4 42.65Мб
004 Domain 4 recap Certified in Cybersecurity (CC)_en.srt 125.70Кб
004 Domain 4 recap Certified in Cybersecurity (CC).mp4 408.01Мб
004 How to approach certification studying_en.srt 6.10Кб
004 How to approach certification studying.mp4 26.50Мб
004 I passed the exam now what_en.srt 8.66Кб
004 I passed the exam now what.mp4 20.30Мб
004 Physical Security - part 3_en.srt 20.21Кб
004 Physical Security - part 3.mp4 27.80Мб
004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2_en.srt 12.91Кб
004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4 18.57Мб
004 The OSI Model - Part 1_en.srt 25.40Кб
004 The OSI Model - Part 1.mp4 100.95Мб
005 Cryptography - Part 1_en.srt 15.12Кб
005 Cryptography - Part 1.mp4 31.71Мб
005 Domain 5 recap Certified in Cybersecurity (CC)_en.srt 50.39Кб
005 Domain 5 recap Certified in Cybersecurity (CC).mp4 161.52Мб
005 DRP - Disaster Recovery Planning - Part 1_en.srt 19.73Кб
005 DRP - Disaster Recovery Planning - Part 1.mp4 44.90Мб
005 General Certified in Cybersecurity (CC) links.html 3.13Кб
005 I failed the exam now what_en.srt 16.36Кб
005 I failed the exam now what.mp4 24.49Мб
005 Physical Security - part 4_en.srt 14.26Кб
005 Physical Security - part 4.mp4 25.06Мб
005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3_en.srt 6.39Кб
005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4 9.47Мб
005 The OSI Model - Part 2_en.srt 13.41Кб
005 The OSI Model - Part 2.mp4 49.81Мб
006 CC-Fillable-study-plan-2023.pdf 370.96Кб
006 CC-Study-plan-by-ThorTeaches.xlsx 10.50Кб
006 Cryptography - Part 2_en.srt 11.73Кб
006 Cryptography - Part 2.mp4 51.12Мб
006 DRP - Disaster Recovery Planning - Part 2_en.srt 9.44Кб
006 DRP - Disaster Recovery Planning - Part 2.mp4 37.65Мб
006 How to approach practice questions_en.srt 18.28Кб
006 How to approach practice questions.mp4 118.51Мб
006 Physical Security - part 5_en.srt 12.01Кб
006 Physical Security - part 5.mp4 22.64Мб
006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4_en.srt 16.02Кб
006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4 23.36Мб
006 The OSI Model - Part 3_en.srt 12.73Кб
006 The OSI Model - Part 3.mp4 56.88Мб
007 Cryptography - Part 3_en.srt 10.82Кб
007 Cryptography - Part 3.mp4 32.74Мб
007 DRP - Disaster Recovery Planning - Part 3_en.srt 15.92Кб
007 DRP - Disaster Recovery Planning - Part 3.mp4 47.13Мб
007 How to design your career and certification path_en.srt 23.76Кб
007 How to design your career and certification path.mp4 74.37Мб
007 Logical Access Control - Part 1_en.srt 14.43Кб
007 Logical Access Control - Part 1.mp4 27.12Мб
007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5_en.srt 6.48Кб
007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4 12.71Мб
007 The TCPIP model_en.srt 14.66Кб
007 The TCPIP model.mp4 48.74Мб
008 DRP - Disaster Recovery Planning - Part 4_en.srt 21.00Кб
008 DRP - Disaster Recovery Planning - Part 4.mp4 64.44Мб
008 Hashing_en.srt 10.33Кб
008 Hashing.mp4 19.00Мб
008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1_en.srt 13.71Кб
008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4 44.28Мб
008 IP addresses, port numbers, and MAC addresses - Part 1_en.srt 18.58Кб
008 IP addresses, port numbers, and MAC addresses - Part 1.mp4 45.83Мб
008 Logical Access Control - Part 2_en.srt 12.28Кб
008 Logical Access Control - Part 2.mp4 18.17Мб
009 Attacks on our cryptography_en.srt 15.33Кб
009 Attacks on our cryptography.mp4 27.86Мб
009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2_en.srt 5.00Кб
009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4 21.54Мб
009 Incidents Response - Part 1_en.srt 20.86Кб
009 Incidents Response - Part 1.mp4 35.90Мб
009 IP addresses, port numbers, and MAC addresses - Part 2_en.srt 9.05Кб
009 IP addresses, port numbers, and MAC addresses - Part 2.mp4 24.34Мб
009 Logical Access Control - Part 3_en.srt 19.06Кб
009 Logical Access Control - Part 3.mp4 78.46Мб
010 Data handling, data storage and data retention - Part 1_en.srt 15.26Кб
010 Data handling, data storage and data retention - Part 1.mp4 56.90Мб
010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3_en.srt 13.02Кб
010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4 34.34Мб
010 Incidents Response - Part 2_en.srt 16.60Кб
010 Incidents Response - Part 2.mp4 28.47Мб
010 IP addresses, port numbers, and MAC addresses - Part 3_en.srt 7.49Кб
010 IP addresses, port numbers, and MAC addresses - Part 3.mp4 20.89Мб
010 Logical Access Control - Part 4_en.srt 13.07Кб
010 Logical Access Control - Part 4.mp4 43.94Мб
011 Data handling, data storage and data retention - Part 2_en.srt 16.81Кб
011 Data handling, data storage and data retention - Part 2.mp4 39.16Мб
011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4_en.srt 15.16Кб
011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4 67.93Мб
011 Incidents Response - Part 3_en.srt 13.12Кб
011 Incidents Response - Part 3.mp4 18.50Мб
011 IP support protocols - Part 1_en.srt 12.20Кб
011 IP support protocols - Part 1.mp4 46.51Мб
011 Logical Access Control - Part 5_en.srt 18.67Кб
011 Logical Access Control - Part 5.mp4 81.13Мб
012 Data handling, data storage and data retention - Part 3_en.srt 9.11Кб
012 Data handling, data storage and data retention - Part 3.mp4 28.28Мб
012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5_en.srt 7.08Кб
012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4 18.76Мб
012 Incidents Response - Part 4_en.srt 18.01Кб
012 Incidents Response - Part 4.mp4 23.22Мб
012 IP support protocols - Part 2_en.srt 10.09Кб
012 IP support protocols - Part 2.mp4 33.89Мб
012 What we covered in Domain 3_en.srt 1.08Кб
012 What we covered in Domain 3.mp4 6.91Мб
013 Administrative (Directive) Controls_en.srt 26.41Кб
013 Administrative (Directive) Controls.mp4 87.94Мб
013 Cables - Part 1_en.srt 12.03Кб
013 Cables - Part 1.mp4 22.32Мб
013 Certified in Cybersecurity Domain (CC) 3 links.html 5.06Кб
013 Incidents Response - Part 5_en.srt 12.33Кб
013 Incidents Response - Part 5.mp4 44.03Мб
013 Privacy_en.srt 9.99Кб
013 Privacy.mp4 16.11Мб
014 Cables - Part 2_en.srt 13.27Кб
014 Cables - Part 2.mp4 45.97Мб
014 Risk Management - part 1_en.srt 8.46Кб
014 Risk Management - part 1.mp4 12.94Мб
014 Training and awareness_en.srt 14.32Кб
014 Training and awareness.mp4 28.09Мб
014 What we covered in Domain 2_en.srt 996б
014 What we covered in Domain 2.mp4 6.97Мб
015 Certified in Cybersecurity (CC) Domain 2 links.html 2.15Кб
015 LAN topologies_en.srt 14.12Кб
015 LAN topologies.mp4 26.23Мб
015 Risk Management - part 2_en.srt 14.39Кб
015 Risk Management - part 2.mp4 30.33Мб
015 Social Engineering attacks - Part 1_en.srt 17.45Кб
015 Social Engineering attacks - Part 1.mp4 31.51Мб
016 Risk Management - part 3_en.srt 17.02Кб
016 Risk Management - part 3.mp4 26.77Мб
016 Social Engineering attacks - Part 2_en.srt 18.00Кб
016 Social Engineering attacks - Part 2.mp4 41.60Мб
016 Wi-Fi_en.srt 16.14Кб
016 Wi-Fi.mp4 51.74Мб
017 Risk Management - part 4_en.srt 16.04Кб
017 Risk Management - part 4.mp4 30.80Мб
017 What we covered in Domain 5_en.srt 1.40Кб
017 What we covered in Domain 5.mp4 8.47Мб
017 Wireless networks - Part 1_en.srt 11.56Кб
017 Wireless networks - Part 1.mp4 20.06Мб
018 Certified in Cybersecurity (CC) Domain 5 links.html 5.65Кб
018 Risk Management - part 5_en.srt 14.43Кб
018 Risk Management - part 5.mp4 47.26Мб
018 Wireless networks - Part 2_en.srt 10.39Кб
018 Wireless networks - Part 2.mp4 40.54Мб
019 Risk Management - part 6_en.srt 10.15Кб
019 Risk Management - part 6.mp4 24.03Мб
019 VLANs and Routers - Part 1_en.srt 12.02Кб
019 VLANs and Routers - Part 1.mp4 41.41Мб
020 Access Control Categories and Types - part 1_en.srt 14.21Кб
020 Access Control Categories and Types - part 1.mp4 28.19Мб
020 VLANs and Routers - Part 2_en.srt 14.31Кб
020 VLANs and Routers - Part 2.mp4 42.52Мб
021 Access Control Categories and Types - part 2_en.srt 17.01Кб
021 Access Control Categories and Types - part 2.mp4 39.31Мб
021 VPNs, NAC, and third-party connectivity_en.srt 21.54Кб
021 VPNs, NAC, and third-party connectivity.mp4 49.27Мб
022 SDN, SD-WAN, and SDX_en.srt 15.48Кб
022 SDN, SD-WAN, and SDX.mp4 37.67Мб
022 The Ethics of your organizations and (ISC)2_en.srt 6.83Кб
022 The Ethics of your organizations and (ISC)2.mp4 17.73Мб
023 Attacks and attackers - Part 1_en.srt 13.53Кб
023 Attacks and attackers - Part 1.mp4 29.25Мб
023 Governance vs. Management_en.srt 13.62Кб
023 Governance vs. Management.mp4 45.51Мб
024 Attacks and attackers - Part 2_en.srt 20.30Кб
024 Attacks and attackers - Part 2.mp4 37.67Мб
024 Laws and regulations - part 1_en.srt 13.84Кб
024 Laws and regulations - part 1.mp4 77.44Мб
025 Attacks and attackers - Part 3_en.srt 15.68Кб
025 Attacks and attackers - Part 3.mp4 64.59Мб
025 Laws and regulations - part 2_en.srt 15.05Кб
025 Laws and regulations - part 2.mp4 55.54Мб
026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1_en.srt 11.69Кб
026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4 26.55Мб
026 Security governance principles_en.srt 17.50Кб
026 Security governance principles.mp4 60.30Мб
027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2_en.srt 15.34Кб
027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4 35.91Мб
027 What we covered in Domain 1_en.srt 975б
027 What we covered in Domain 1.mp4 8.34Мб
028 Certified in Cybersecurity (CC) Domain 1 links.html 4.88Кб
028 SIEM and SOAR systems_en.srt 10.48Кб
028 SIEM and SOAR systems.mp4 26.21Мб
029 Honeynets and Honeypots_en.srt 5.43Кб
029 Honeynets and Honeypots.mp4 10.89Мб
030 Firewalls - Part 1_en.srt 9.31Кб
030 Firewalls - Part 1.mp4 28.95Мб
031 Firewalls - Part 2_en.srt 16.66Кб
031 Firewalls - Part 2.mp4 34.78Мб
032 0-day attacks and exploits_en.srt 13.76Кб
032 0-day attacks and exploits.mp4 56.09Мб
033 Vulnerability Scanning_en.srt 8.43Кб
033 Vulnerability Scanning.mp4 16.41Мб
034 Virtualization, Cloud, and Distributed Computing - Part 1_en.srt 12.29Кб
034 Virtualization, Cloud, and Distributed Computing - Part 1.mp4 29.24Мб
035 Virtualization, Cloud, and Distributed Computing - Part 2_en.srt 13.87Кб
035 Virtualization, Cloud, and Distributed Computing - Part 2.mp4 26.52Мб
036 Virtualization, Cloud, and Distributed Computing - Part 3_en.srt 9.97Кб
036 Virtualization, Cloud, and Distributed Computing - Part 3.mp4 21.58Мб
037 Virtualization, Cloud, and Distributed Computing - Part 4_en.srt 17.59Кб
037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4 58.58Мб
038 Virtualization, Cloud, and Distributed Computing - Part 5_en.srt 18.94Кб
038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4 87.42Мб
039 The Internet of Things (IoT)_en.srt 10.35Кб
039 The Internet of Things (IoT).mp4 19.93Мб
040 Asset tracking and hardware hardening_en.srt 14.58Кб
040 Asset tracking and hardware hardening.mp4 24.47Мб
041 Electricity_en.srt 17.83Кб
041 Electricity.mp4 58.20Мб
042 Backups - Part 1_en.srt 18.07Кб
042 Backups - Part 1.mp4 33.52Мб
043 Backups - Part 2_en.srt 14.13Кб
043 Backups - Part 2.mp4 30.14Мб
044 Fault tolerance, redundancy, and resiliency - Part 1_en.srt 10.98Кб
044 Fault tolerance, redundancy, and resiliency - Part 1.mp4 19.65Мб
045 Fault tolerance, redundancy, and resiliency - Part 2_en.srt 16.91Кб
045 Fault tolerance, redundancy, and resiliency - Part 2.mp4 22.04Мб
046 Fault tolerance, redundancy, and resiliency - Part 3_en.srt 10.63Кб
046 Fault tolerance, redundancy, and resiliency - Part 3.mp4 23.09Мб
047 Fire suppression - Part 1_en.srt 10.31Кб
047 Fire suppression - Part 1.mp4 18.61Мб
048 Fire suppression - Part 2_en.srt 14.44Кб
048 Fire suppression - Part 2.mp4 30.38Мб
049 Secure design principles - Part 1_en.srt 14.65Кб
049 Secure design principles - Part 1.mp4 57.32Мб
050 Secure design principles - Part 2_en.srt 17.08Кб
050 Secure design principles - Part 2.mp4 36.04Мб
051 What we covered in Domain 4_en.srt 1.15Кб
051 What we covered in Domain 4.mp4 7.43Мб
052 Certified in Cybersecurity (CC) Domain 4 links.html 13.46Кб
Статистика распространения по странам
Монголия (MN) 5
США (US) 5
Великобритания (GB) 2
Иордания (JO) 1
Греция (GR) 1
Румыния (RO) 1
Бангладеш (BD) 1
Нидерланды (NL) 1
Азербайджан (AZ) 1
Нигерия (NG) 1
Канада (CA) 1
Всего 20
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент