|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| [CourseClub.Me].url |
122б |
| [CourseClub.Me].url |
122б |
| [FreeCourseSite.com].url |
127б |
| [FreeCourseSite.com].url |
127б |
| [GigaCourse.Com].url |
49б |
| [GigaCourse.Com].url |
49б |
| 001 2023-CC-Domain-1-Study-guide-by-ThorTeaches.com-v1.1.pdf |
1.33Мб |
| 001 2023-CC-Domain-2-Study-guide-by-ThorTeaches.com-v1.1.pdf |
813.63Кб |
| 001 2023-CC-Domain-3-Study-guide-by-ThorTeaches.com-v1.1.pdf |
1.15Мб |
| 001 2023-CC-Domain-4-Study-guide-by-ThorTeaches.com-v1.1.pdf |
4.42Мб |
| 001 2023-CC-Domain-5-Study-guide-by-ThorTeaches.com-v1.1.pdf |
754.55Кб |
| 001 2023-CC-Mnemonics-by-ThorTeaches.pdf |
281.69Кб |
| 001 Domain 1 recap Certified in Cybersecurity (CC)_en.srt |
33.82Кб |
| 001 Domain 1 recap Certified in Cybersecurity (CC).mp4 |
120.29Мб |
| 001 Domain 1 - What we will be covering_en.srt |
1.23Кб |
| 001 Domain 1 - What we will be covering.mp4 |
10.44Мб |
| 001 Domain 2 - What we will be covering_en.srt |
1.22Кб |
| 001 Domain 2 - What we will be covering.mp4 |
9.15Мб |
| 001 Domain 3 - What we will be covering_en.srt |
1.14Кб |
| 001 Domain 3 - What we will be covering.mp4 |
7.58Мб |
| 001 Domain 4 - What we will be covering_en.srt |
1.03Кб |
| 001 Domain 4 - What we will be covering.mp4 |
8.24Мб |
| 001 Domain 5 - What we will be covering_en.srt |
973б |
| 001 Domain 5 - What we will be covering.mp4 |
6.41Мб |
| 001 Introduction and download your free study guides_en.srt |
1.13Кб |
| 001 Introduction and download your free study guides.mp4 |
11.55Мб |
| 001 Why you should want to get Certified in Cybersecurity_en.srt |
9.30Кб |
| 001 Why you should want to get Certified in Cybersecurity.mp4 |
18.05Мб |
| 002 BCP - Business Continuity Planning - Part 1_en.srt |
11.75Кб |
| 002 BCP - Business Continuity Planning - Part 1.mp4 |
40.19Мб |
| 002 Configuration Management_en.srt |
11.48Кб |
| 002 Configuration Management.mp4 |
15.25Мб |
| 002 Connect with me on Social media and the Udemy ratings system_en.srt |
2.79Кб |
| 002 Connect with me on Social media and the Udemy ratings system.mp4 |
12.13Мб |
| 002 Domain 2 recap Certified in Cybersecurity (CC)_en.srt |
27.92Кб |
| 002 Domain 2 recap Certified in Cybersecurity (CC).mp4 |
87.58Мб |
| 002 Network Basics and Definitions - Part 1_en.srt |
18.57Кб |
| 002 Network Basics and Definitions - Part 1.mp4 |
44.54Мб |
| 002 Physical Security - part 1_en.srt |
19.05Кб |
| 002 Physical Security - part 1.mp4 |
43.48Мб |
| 002 Scheduling your exam and what to expect_en.srt |
9.17Кб |
| 002 Scheduling your exam and what to expect.mp4 |
42.74Мб |
| 002 The differences between Information Security, IT Security, and Cybersecurity_en.srt |
10.26Кб |
| 002 The differences between Information Security, IT Security, and Cybersecurity.mp4 |
55.99Мб |
| 003 BCP - Business Continuity Planning - Part 2_en.srt |
20.68Кб |
| 003 BCP - Business Continuity Planning - Part 2.mp4 |
31.03Мб |
| 003 Domain 3 recap Certified in Cybersecurity (CC)_en.srt |
21.09Кб |
| 003 Domain 3 recap Certified in Cybersecurity (CC).mp4 |
88.62Мб |
| 003 How to get the most out of my courses and the Udemy interface_en.srt |
3.94Кб |
| 003 How to get the most out of my courses and the Udemy interface.mp4 |
29.24Мб |
| 003 Network Basics and Definitions - Part 2_en.srt |
16.51Кб |
| 003 Network Basics and Definitions - Part 2.mp4 |
38.86Мб |
| 003 Patch Management_en.srt |
21.45Кб |
| 003 Patch Management.mp4 |
28.32Мб |
| 003 Physical Security - part 2_en.srt |
11.82Кб |
| 003 Physical Security - part 2.mp4 |
43.88Мб |
| 003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1_en.srt |
11.24Кб |
| 003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4 |
21.43Мб |
| 003 What to expect on exam day and after_en.srt |
13.70Кб |
| 003 What to expect on exam day and after.mp4 |
33.22Мб |
| 004 BCP - Business Continuity Planning - Part 3_en.srt |
20.13Кб |
| 004 BCP - Business Continuity Planning - Part 3.mp4 |
45.47Мб |
| 004 Change Management_en.srt |
21.25Кб |
| 004 Change Management.mp4 |
42.65Мб |
| 004 Domain 4 recap Certified in Cybersecurity (CC)_en.srt |
125.70Кб |
| 004 Domain 4 recap Certified in Cybersecurity (CC).mp4 |
408.01Мб |
| 004 How to approach certification studying_en.srt |
6.10Кб |
| 004 How to approach certification studying.mp4 |
26.50Мб |
| 004 I passed the exam now what_en.srt |
8.66Кб |
| 004 I passed the exam now what.mp4 |
20.30Мб |
| 004 Physical Security - part 3_en.srt |
20.21Кб |
| 004 Physical Security - part 3.mp4 |
27.80Мб |
| 004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2_en.srt |
12.91Кб |
| 004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4 |
18.57Мб |
| 004 The OSI Model - Part 1_en.srt |
25.40Кб |
| 004 The OSI Model - Part 1.mp4 |
100.95Мб |
| 005 Cryptography - Part 1_en.srt |
15.12Кб |
| 005 Cryptography - Part 1.mp4 |
31.71Мб |
| 005 Domain 5 recap Certified in Cybersecurity (CC)_en.srt |
50.39Кб |
| 005 Domain 5 recap Certified in Cybersecurity (CC).mp4 |
161.52Мб |
| 005 DRP - Disaster Recovery Planning - Part 1_en.srt |
19.73Кб |
| 005 DRP - Disaster Recovery Planning - Part 1.mp4 |
44.90Мб |
| 005 General Certified in Cybersecurity (CC) links.html |
3.13Кб |
| 005 I failed the exam now what_en.srt |
16.36Кб |
| 005 I failed the exam now what.mp4 |
24.49Мб |
| 005 Physical Security - part 4_en.srt |
14.26Кб |
| 005 Physical Security - part 4.mp4 |
25.06Мб |
| 005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3_en.srt |
6.39Кб |
| 005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4 |
9.47Мб |
| 005 The OSI Model - Part 2_en.srt |
13.41Кб |
| 005 The OSI Model - Part 2.mp4 |
49.81Мб |
| 006 CC-Fillable-study-plan-2023.pdf |
370.96Кб |
| 006 CC-Study-plan-by-ThorTeaches.xlsx |
10.50Кб |
| 006 Cryptography - Part 2_en.srt |
11.73Кб |
| 006 Cryptography - Part 2.mp4 |
51.12Мб |
| 006 DRP - Disaster Recovery Planning - Part 2_en.srt |
9.44Кб |
| 006 DRP - Disaster Recovery Planning - Part 2.mp4 |
37.65Мб |
| 006 How to approach practice questions_en.srt |
18.28Кб |
| 006 How to approach practice questions.mp4 |
118.51Мб |
| 006 Physical Security - part 5_en.srt |
12.01Кб |
| 006 Physical Security - part 5.mp4 |
22.64Мб |
| 006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4_en.srt |
16.02Кб |
| 006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4 |
23.36Мб |
| 006 The OSI Model - Part 3_en.srt |
12.73Кб |
| 006 The OSI Model - Part 3.mp4 |
56.88Мб |
| 007 Cryptography - Part 3_en.srt |
10.82Кб |
| 007 Cryptography - Part 3.mp4 |
32.74Мб |
| 007 DRP - Disaster Recovery Planning - Part 3_en.srt |
15.92Кб |
| 007 DRP - Disaster Recovery Planning - Part 3.mp4 |
47.13Мб |
| 007 How to design your career and certification path_en.srt |
23.76Кб |
| 007 How to design your career and certification path.mp4 |
74.37Мб |
| 007 Logical Access Control - Part 1_en.srt |
14.43Кб |
| 007 Logical Access Control - Part 1.mp4 |
27.12Мб |
| 007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5_en.srt |
6.48Кб |
| 007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4 |
12.71Мб |
| 007 The TCPIP model_en.srt |
14.66Кб |
| 007 The TCPIP model.mp4 |
48.74Мб |
| 008 DRP - Disaster Recovery Planning - Part 4_en.srt |
21.00Кб |
| 008 DRP - Disaster Recovery Planning - Part 4.mp4 |
64.44Мб |
| 008 Hashing_en.srt |
10.33Кб |
| 008 Hashing.mp4 |
19.00Мб |
| 008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1_en.srt |
13.71Кб |
| 008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4 |
44.28Мб |
| 008 IP addresses, port numbers, and MAC addresses - Part 1_en.srt |
18.58Кб |
| 008 IP addresses, port numbers, and MAC addresses - Part 1.mp4 |
45.83Мб |
| 008 Logical Access Control - Part 2_en.srt |
12.28Кб |
| 008 Logical Access Control - Part 2.mp4 |
18.17Мб |
| 009 Attacks on our cryptography_en.srt |
15.33Кб |
| 009 Attacks on our cryptography.mp4 |
27.86Мб |
| 009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2_en.srt |
5.00Кб |
| 009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4 |
21.54Мб |
| 009 Incidents Response - Part 1_en.srt |
20.86Кб |
| 009 Incidents Response - Part 1.mp4 |
35.90Мб |
| 009 IP addresses, port numbers, and MAC addresses - Part 2_en.srt |
9.05Кб |
| 009 IP addresses, port numbers, and MAC addresses - Part 2.mp4 |
24.34Мб |
| 009 Logical Access Control - Part 3_en.srt |
19.06Кб |
| 009 Logical Access Control - Part 3.mp4 |
78.46Мб |
| 010 Data handling, data storage and data retention - Part 1_en.srt |
15.26Кб |
| 010 Data handling, data storage and data retention - Part 1.mp4 |
56.90Мб |
| 010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3_en.srt |
13.02Кб |
| 010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4 |
34.34Мб |
| 010 Incidents Response - Part 2_en.srt |
16.60Кб |
| 010 Incidents Response - Part 2.mp4 |
28.47Мб |
| 010 IP addresses, port numbers, and MAC addresses - Part 3_en.srt |
7.49Кб |
| 010 IP addresses, port numbers, and MAC addresses - Part 3.mp4 |
20.89Мб |
| 010 Logical Access Control - Part 4_en.srt |
13.07Кб |
| 010 Logical Access Control - Part 4.mp4 |
43.94Мб |
| 011 Data handling, data storage and data retention - Part 2_en.srt |
16.81Кб |
| 011 Data handling, data storage and data retention - Part 2.mp4 |
39.16Мб |
| 011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4_en.srt |
15.16Кб |
| 011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4 |
67.93Мб |
| 011 Incidents Response - Part 3_en.srt |
13.12Кб |
| 011 Incidents Response - Part 3.mp4 |
18.50Мб |
| 011 IP support protocols - Part 1_en.srt |
12.20Кб |
| 011 IP support protocols - Part 1.mp4 |
46.51Мб |
| 011 Logical Access Control - Part 5_en.srt |
18.67Кб |
| 011 Logical Access Control - Part 5.mp4 |
81.13Мб |
| 012 Data handling, data storage and data retention - Part 3_en.srt |
9.11Кб |
| 012 Data handling, data storage and data retention - Part 3.mp4 |
28.28Мб |
| 012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5_en.srt |
7.08Кб |
| 012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4 |
18.76Мб |
| 012 Incidents Response - Part 4_en.srt |
18.01Кб |
| 012 Incidents Response - Part 4.mp4 |
23.22Мб |
| 012 IP support protocols - Part 2_en.srt |
10.09Кб |
| 012 IP support protocols - Part 2.mp4 |
33.89Мб |
| 012 What we covered in Domain 3_en.srt |
1.08Кб |
| 012 What we covered in Domain 3.mp4 |
6.91Мб |
| 013 Administrative (Directive) Controls_en.srt |
26.41Кб |
| 013 Administrative (Directive) Controls.mp4 |
87.94Мб |
| 013 Cables - Part 1_en.srt |
12.03Кб |
| 013 Cables - Part 1.mp4 |
22.32Мб |
| 013 Certified in Cybersecurity Domain (CC) 3 links.html |
5.06Кб |
| 013 Incidents Response - Part 5_en.srt |
12.33Кб |
| 013 Incidents Response - Part 5.mp4 |
44.03Мб |
| 013 Privacy_en.srt |
9.99Кб |
| 013 Privacy.mp4 |
16.11Мб |
| 014 Cables - Part 2_en.srt |
13.27Кб |
| 014 Cables - Part 2.mp4 |
45.97Мб |
| 014 Risk Management - part 1_en.srt |
8.46Кб |
| 014 Risk Management - part 1.mp4 |
12.94Мб |
| 014 Training and awareness_en.srt |
14.32Кб |
| 014 Training and awareness.mp4 |
28.09Мб |
| 014 What we covered in Domain 2_en.srt |
996б |
| 014 What we covered in Domain 2.mp4 |
6.97Мб |
| 015 Certified in Cybersecurity (CC) Domain 2 links.html |
2.15Кб |
| 015 LAN topologies_en.srt |
14.12Кб |
| 015 LAN topologies.mp4 |
26.23Мб |
| 015 Risk Management - part 2_en.srt |
14.39Кб |
| 015 Risk Management - part 2.mp4 |
30.33Мб |
| 015 Social Engineering attacks - Part 1_en.srt |
17.45Кб |
| 015 Social Engineering attacks - Part 1.mp4 |
31.51Мб |
| 016 Risk Management - part 3_en.srt |
17.02Кб |
| 016 Risk Management - part 3.mp4 |
26.77Мб |
| 016 Social Engineering attacks - Part 2_en.srt |
18.00Кб |
| 016 Social Engineering attacks - Part 2.mp4 |
41.60Мб |
| 016 Wi-Fi_en.srt |
16.14Кб |
| 016 Wi-Fi.mp4 |
51.74Мб |
| 017 Risk Management - part 4_en.srt |
16.04Кб |
| 017 Risk Management - part 4.mp4 |
30.80Мб |
| 017 What we covered in Domain 5_en.srt |
1.40Кб |
| 017 What we covered in Domain 5.mp4 |
8.47Мб |
| 017 Wireless networks - Part 1_en.srt |
11.56Кб |
| 017 Wireless networks - Part 1.mp4 |
20.06Мб |
| 018 Certified in Cybersecurity (CC) Domain 5 links.html |
5.65Кб |
| 018 Risk Management - part 5_en.srt |
14.43Кб |
| 018 Risk Management - part 5.mp4 |
47.26Мб |
| 018 Wireless networks - Part 2_en.srt |
10.39Кб |
| 018 Wireless networks - Part 2.mp4 |
40.54Мб |
| 019 Risk Management - part 6_en.srt |
10.15Кб |
| 019 Risk Management - part 6.mp4 |
24.03Мб |
| 019 VLANs and Routers - Part 1_en.srt |
12.02Кб |
| 019 VLANs and Routers - Part 1.mp4 |
41.41Мб |
| 020 Access Control Categories and Types - part 1_en.srt |
14.21Кб |
| 020 Access Control Categories and Types - part 1.mp4 |
28.19Мб |
| 020 VLANs and Routers - Part 2_en.srt |
14.31Кб |
| 020 VLANs and Routers - Part 2.mp4 |
42.52Мб |
| 021 Access Control Categories and Types - part 2_en.srt |
17.01Кб |
| 021 Access Control Categories and Types - part 2.mp4 |
39.31Мб |
| 021 VPNs, NAC, and third-party connectivity_en.srt |
21.54Кб |
| 021 VPNs, NAC, and third-party connectivity.mp4 |
49.27Мб |
| 022 SDN, SD-WAN, and SDX_en.srt |
15.48Кб |
| 022 SDN, SD-WAN, and SDX.mp4 |
37.67Мб |
| 022 The Ethics of your organizations and (ISC)2_en.srt |
6.83Кб |
| 022 The Ethics of your organizations and (ISC)2.mp4 |
17.73Мб |
| 023 Attacks and attackers - Part 1_en.srt |
13.53Кб |
| 023 Attacks and attackers - Part 1.mp4 |
29.25Мб |
| 023 Governance vs. Management_en.srt |
13.62Кб |
| 023 Governance vs. Management.mp4 |
45.51Мб |
| 024 Attacks and attackers - Part 2_en.srt |
20.30Кб |
| 024 Attacks and attackers - Part 2.mp4 |
37.67Мб |
| 024 Laws and regulations - part 1_en.srt |
13.84Кб |
| 024 Laws and regulations - part 1.mp4 |
77.44Мб |
| 025 Attacks and attackers - Part 3_en.srt |
15.68Кб |
| 025 Attacks and attackers - Part 3.mp4 |
64.59Мб |
| 025 Laws and regulations - part 2_en.srt |
15.05Кб |
| 025 Laws and regulations - part 2.mp4 |
55.54Мб |
| 026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1_en.srt |
11.69Кб |
| 026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4 |
26.55Мб |
| 026 Security governance principles_en.srt |
17.50Кб |
| 026 Security governance principles.mp4 |
60.30Мб |
| 027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2_en.srt |
15.34Кб |
| 027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4 |
35.91Мб |
| 027 What we covered in Domain 1_en.srt |
975б |
| 027 What we covered in Domain 1.mp4 |
8.34Мб |
| 028 Certified in Cybersecurity (CC) Domain 1 links.html |
4.88Кб |
| 028 SIEM and SOAR systems_en.srt |
10.48Кб |
| 028 SIEM and SOAR systems.mp4 |
26.21Мб |
| 029 Honeynets and Honeypots_en.srt |
5.43Кб |
| 029 Honeynets and Honeypots.mp4 |
10.89Мб |
| 030 Firewalls - Part 1_en.srt |
9.31Кб |
| 030 Firewalls - Part 1.mp4 |
28.95Мб |
| 031 Firewalls - Part 2_en.srt |
16.66Кб |
| 031 Firewalls - Part 2.mp4 |
34.78Мб |
| 032 0-day attacks and exploits_en.srt |
13.76Кб |
| 032 0-day attacks and exploits.mp4 |
56.09Мб |
| 033 Vulnerability Scanning_en.srt |
8.43Кб |
| 033 Vulnerability Scanning.mp4 |
16.41Мб |
| 034 Virtualization, Cloud, and Distributed Computing - Part 1_en.srt |
12.29Кб |
| 034 Virtualization, Cloud, and Distributed Computing - Part 1.mp4 |
29.24Мб |
| 035 Virtualization, Cloud, and Distributed Computing - Part 2_en.srt |
13.87Кб |
| 035 Virtualization, Cloud, and Distributed Computing - Part 2.mp4 |
26.52Мб |
| 036 Virtualization, Cloud, and Distributed Computing - Part 3_en.srt |
9.97Кб |
| 036 Virtualization, Cloud, and Distributed Computing - Part 3.mp4 |
21.58Мб |
| 037 Virtualization, Cloud, and Distributed Computing - Part 4_en.srt |
17.59Кб |
| 037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4 |
58.58Мб |
| 038 Virtualization, Cloud, and Distributed Computing - Part 5_en.srt |
18.94Кб |
| 038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4 |
87.42Мб |
| 039 The Internet of Things (IoT)_en.srt |
10.35Кб |
| 039 The Internet of Things (IoT).mp4 |
19.93Мб |
| 040 Asset tracking and hardware hardening_en.srt |
14.58Кб |
| 040 Asset tracking and hardware hardening.mp4 |
24.47Мб |
| 041 Electricity_en.srt |
17.83Кб |
| 041 Electricity.mp4 |
58.20Мб |
| 042 Backups - Part 1_en.srt |
18.07Кб |
| 042 Backups - Part 1.mp4 |
33.52Мб |
| 043 Backups - Part 2_en.srt |
14.13Кб |
| 043 Backups - Part 2.mp4 |
30.14Мб |
| 044 Fault tolerance, redundancy, and resiliency - Part 1_en.srt |
10.98Кб |
| 044 Fault tolerance, redundancy, and resiliency - Part 1.mp4 |
19.65Мб |
| 045 Fault tolerance, redundancy, and resiliency - Part 2_en.srt |
16.91Кб |
| 045 Fault tolerance, redundancy, and resiliency - Part 2.mp4 |
22.04Мб |
| 046 Fault tolerance, redundancy, and resiliency - Part 3_en.srt |
10.63Кб |
| 046 Fault tolerance, redundancy, and resiliency - Part 3.mp4 |
23.09Мб |
| 047 Fire suppression - Part 1_en.srt |
10.31Кб |
| 047 Fire suppression - Part 1.mp4 |
18.61Мб |
| 048 Fire suppression - Part 2_en.srt |
14.44Кб |
| 048 Fire suppression - Part 2.mp4 |
30.38Мб |
| 049 Secure design principles - Part 1_en.srt |
14.65Кб |
| 049 Secure design principles - Part 1.mp4 |
57.32Мб |
| 050 Secure design principles - Part 2_en.srt |
17.08Кб |
| 050 Secure design principles - Part 2.mp4 |
36.04Мб |
| 051 What we covered in Domain 4_en.srt |
1.15Кб |
| 051 What we covered in Domain 4.mp4 |
7.43Мб |
| 052 Certified in Cybersecurity (CC) Domain 4 links.html |
13.46Кб |