Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
489.10Кб |
001 - Introduction to CISSP.mp4 |
7.09Мб |
002 - C-I-A.mp4 |
123.72Мб |
003 - Security Governance Fundamentals.mp4 |
80.30Мб |
005 - Regulatory Compliance.mp4 |
115.54Мб |
006 - Protecting Privacy.mp4 |
116.62Мб |
007 - Intellectual Property.mp4 |
71.69Мб |
008 - Import-Export.mp4 |
39.39Мб |
009 - Ethics.mp4 |
35.16Мб |
011 - Risk Definitions.mp4 |
65.97Мб |
012 - Risk Frameworks.mp4 |
51.63Мб |
013 - Risk Assessment.mp4 |
144.08Мб |
014 - Threats and Threat Agents.mp4 |
65.98Мб |
015 - Risk Assignment.mp4 |
60.41Мб |
016 - Threat Modeling.mp4 |
38.65Мб |
017 - Security Awareness.mp4 |
64.51Мб |
018 - Due Diligence and Due Care.mp4 |
52.88Мб |
019 - Vendor Security.mp4 |
64.89Мб |
021 - Policy.mp4 |
48.76Мб |
022 - Personnel Security.mp4 |
82.05Мб |
023 - Control Frameworks.mp4 |
77.60Мб |
024 - SLAs.mp4 |
27.56Мб |
025 - Security Documents.mp4 |
41.83Мб |
027 - Managing Data.mp4 |
100.95Мб |
028 - Data Ownership.mp4 |
26.41Мб |
029 - Data Security Controls.mp4 |
70.13Мб |
030 - Data Remanence.mp4 |
57.99Мб |
031 - Data at Rest.mp4 |
89.29Мб |
032 - Data in Transit.mp4 |
66.77Мб |
033 - Classification.mp4 |
77.82Мб |
035 - Cryptography Terminology.mp4 |
84.82Мб |
036 - Hashing.mp4 |
74.11Мб |
037 - Cryptographic Attacks.mp4 |
63.86Мб |
038 - Symmetric Cryptography.mp4 |
67.95Мб |
039 - Asymmetric Cryptography.mp4 |
74.74Мб |
040 - Hybrid Cryptography.mp4 |
41.54Мб |
042 - Ciphers.mp4 |
28.87Мб |
043 - Digital Signatures.mp4 |
81.06Мб |
045 - PKI Definition and Components.mp4 |
78.02Мб |
046 - PKI Certificates.mp4 |
32.19Мб |
047 - Key Management.mp4 |
82.78Мб |
048 - Key Exchange.mp4 |
70.12Мб |
050 - Secure Design Principles.mp4 |
66.65Мб |
051 - Security Models Part 1.mp4 |
67.94Мб |
052 - Security Models Part 2.mp4 |
84.49Мб |
053 - Security Models Part 3.mp4 |
70.57Мб |
054 - Security Modes.mp4 |
30.90Мб |
055 - Evaluation Models.mp4 |
52.42Мб |
056 - Rainbow Series.mp4 |
27.31Мб |
057 - Common Criteria.mp4 |
54.94Мб |
058 - Certification and Accreditation.mp4 |
29.89Мб |
060 - TCB.mp4 |
17.68Мб |
061 - Computer Components.mp4 |
62.16Мб |
062 - Protection Mechanisms.mp4 |
67.60Мб |
063 - Common Architecture Flaws.mp4 |
86.93Мб |
064 - Web-Based Vulnerabilities.mp4 |
69.51Мб |
065 - Covert Channels.mp4 |
48.60Мб |
066 - Embedded Systems.mp4 |
47.89Мб |
068 - Facility Design.mp4 |
63.75Мб |
069 - Facility Construction.mp4 |
36.23Мб |
070 - Physical Security.mp4 |
112.92Мб |
071 - Perimeter Defenses.mp4 |
100.98Мб |
072 - Doors and Locks.mp4 |
70.68Мб |
073 - Internal Facilities Security.mp4 |
117.72Мб |
074 - Physical Intrusion Detection.mp4 |
107.72Мб |
075 - Personnel Safety.mp4 |
33.40Мб |
077 - Data Center Security.mp4 |
50.26Мб |
078 - Media Storage.mp4 |
33.24Мб |
079 - Utilities and HVAC.mp4 |
95.57Мб |
080 - Fire Safety.mp4 |
86.40Мб |
082 - Database Architectures.mp4 |
38.18Мб |
083 - Database Terminology.mp4 |
72.21Мб |
084 - Data Mining.mp4 |
33.14Мб |
085 - Transaction Management.mp4 |
45.60Мб |
086 - Database Attacks.mp4 |
65.35Мб |
088 - OSI Protocols.mp4 |
70.69Мб |
090 - OSI Layers.mp4 |
88.81Мб |
092 - TCPIP Model.mp4 |
45.84Мб |
093 - Network Devices.mp4 |
96.51Мб |
094 - Network Security.mp4 |
49.75Мб |
095 - IP Networking.mp4 |
116.81Мб |
097 - DNS and DHCP.mp4 |
79.52Мб |
098 - ARP.mp4 |
32.60Мб |
099 - Multi-layer Protocols.mp4 |
44.73Мб |
1 |
603.95Кб |
10 |
1.08Мб |
100 |
1.72Мб |
100 - Converged Protocols.mp4 |
91.03Мб |
101 |
1.85Мб |
101 - Network Cabling and Topology.mp4 |
120.43Мб |
102 |
1.12Мб |
102 - Signaling Types.mp4 |
40.90Мб |
103 |
1.15Мб |
103 - Network Attacks.mp4 |
100.89Мб |
104 |
1.58Мб |
104 - Switching.mp4 |
17.10Мб |
105 |
1.93Мб |
106 |
379.24Кб |
106 - Wireless Networks.mp4 |
105.04Мб |
107 |
877.03Кб |
107 - Mobile Systems.mp4 |
92.38Мб |
108 |
1.74Мб |
108 - WAN Technologies.mp4 |
74.67Мб |
109 |
258.33Кб |
109 - Remote Access.mp4 |
61.03Мб |
11 |
67.48Кб |
110 |
489.83Кб |
110 - Secure Communication Protocols.mp4 |
81.76Мб |
111 |
599.74Кб |
112 |
733.72Кб |
112 - Firewalls.mp4 |
74.75Мб |
113 |
1.01Мб |
113 - DMZ.mp4 |
80.99Мб |
114 |
1.24Мб |
114 - Honeypots.mp4 |
42.44Мб |
115 |
1.40Мб |
115 - Endpoint Security.mp4 |
24.66Мб |
116 |
1.76Мб |
116 - IDS.mp4 |
67.72Мб |
117 |
1.88Мб |
117 - Authentication Protocols.mp4 |
29.86Мб |
118 |
116.41Кб |
119 |
144.15Кб |
119 - VPN and VLAN.mp4 |
61.47Мб |
12 |
284.47Кб |
120 |
167.63Кб |
121 |
407.44Кб |
121 - Distributed and Cloud Computing.mp4 |
60.19Мб |
122 |
433.90Кб |
122 - Virtualization.mp4 |
76.57Мб |
123 |
1.20Мб |
123 - Virtualized Networks.mp4 |
52.07Мб |
124 |
1.27Мб |
125 |
1.42Мб |
125 - Access Control Basics.mp4 |
59.03Мб |
126 |
1.32Мб |
126 - Access Control Categories.mp4 |
74.25Мб |
127 |
1.56Мб |
127 - Authentication.mp4 |
106.09Мб |
128 |
39.79Кб |
129 |
177.38Кб |
129 - Account Management.mp4 |
52.85Мб |
13 |
1.91Мб |
130 |
475.80Кб |
130 - Single Sign-On (SSO).mp4 |
49.41Мб |
131 |
939.21Кб |
132 |
1.10Мб |
132 - Identification.mp4 |
23.95Мб |
133 |
625.21Кб |
133 - Something You Know.mp4 |
54.28Мб |
134 |
1.35Мб |
134 - Something You Have.mp4 |
76.64Мб |
135 |
1.75Мб |
135 - Something You Are (Biometrics).mp4 |
65.83Мб |
136 |
1.82Мб |
137 |
332.37Кб |
137 - Authorization.mp4 |
35.04Мб |
138 |
1.77Мб |
138 - Session Management and Accountability.mp4 |
34.26Мб |
139 |
863.90Кб |
139 - WLAN Authentication.mp4 |
92.98Мб |
14 |
985.31Кб |
140 |
986.57Кб |
140 - Remote Authentication Services.mp4 |
41.08Мб |
141 |
1.74Мб |
141 - Federated Identity.mp4 |
51.14Мб |
142 |
1.76Мб |
142 - Integrating Identity Services.mp4 |
37.68Мб |
143 |
616.57Кб |
143 - Access Control Models.mp4 |
71.03Мб |
144 |
779.93Кб |
144 - Access Control Techniques.mp4 |
48.12Мб |
145 |
879.08Кб |
145 - Access Control Administration.mp4 |
29.50Мб |
146 |
1.40Мб |
146 - Access Control Attacks.mp4 |
54.84Мб |
147 |
1.81Мб |
147 - Social Engineering.mp4 |
55.65Мб |
148 |
1.10Мб |
148 - Circumventing Access Controls.mp4 |
23.39Мб |
149 |
114.98Кб |
149 - Access Provisioning.mp4 |
66.36Мб |
15 |
1.02Мб |
150 |
146.21Кб |
151 |
507.48Кб |
151 - Security Assessment Goals.mp4 |
56.37Мб |
152 |
1.13Мб |
152 - Control Testing.mp4 |
69.54Мб |
153 |
446.22Кб |
153 - Penetration Testing.mp4 |
72.28Мб |
154 |
711.54Кб |
154 - Security Management Processes.mp4 |
49.28Мб |
155 |
1.59Мб |
156 |
1.34Мб |
156 - Computer Crime.mp4 |
44.58Мб |
157 |
50.58Кб |
157 - Investigations.mp4 |
89.93Мб |
158 |
627.45Кб |
158 - Forensics.mp4 |
121.28Мб |
159 |
323.60Кб |
159 - Evidence.mp4 |
141.41Мб |
16 |
1.05Мб |
160 |
919.23Кб |
161 |
929.70Кб |
161 - Log Management.mp4 |
92.38Мб |
162 - Egress Monitoring.mp4 |
71.73Мб |
163 - Configuration Management.mp4 |
54.15Мб |
164 - Operations Concepts.mp4 |
82.09Мб |
165 - Preventive Measures.mp4 |
96.89Мб |
166 - Trusted Recovery.mp4 |
41.96Мб |
167 - Patch & Vulnerability Management.mp4 |
45.86Мб |
169 - Business Continuity Planning.mp4 |
72.78Мб |
17 |
1.11Мб |
170 - Incident Response Plan.mp4 |
83.99Мб |
171 - Business Impact Analysis (BIA).mp4 |
83.10Мб |
173 - Recovery Strategy.mp4 |
100.81Мб |
174 - Recovery Process.mp4 |
129.30Мб |
175 - Disaster Recovery Plan (DRP) Testing.mp4 |
49.52Мб |
176 - RAID.mp4 |
42.68Мб |
177 - Backups.mp4 |
75.91Мб |
178 - Network Redundancy.mp4 |
48.99Мб |
18 |
1.19Мб |
180 - Secure Software Design.mp4 |
83.81Мб |
181 - Secure SDLC.mp4 |
66.50Мб |
182 - Software Development Models.mp4 |
107.93Мб |
183 - Maturity Models.mp4 |
56.79Мб |
185 - Change Control.mp4 |
58.50Мб |
186 - Software Testing.mp4 |
94.80Мб |
187 - Software Environment.mp4 |
87.22Мб |
188 - Object-Oriented Programming (OOP).mp4 |
45.58Мб |
189 - Distributed Computing.mp4 |
38.25Мб |
19 |
1.11Мб |
190 - Mobile Code.mp4 |
48.24Мб |
191 - Acquired Software.mp4 |
34.24Мб |
192 - Application Attacks.mp4 |
80.68Мб |
193 - Malware.mp4 |
44.80Мб |
2 |
718.55Кб |
20 |
1.49Мб |
21 |
443.22Кб |
22 |
1.20Мб |
23 |
1.02Мб |
24 |
1.62Мб |
25 |
1.62Мб |
26 |
990.14Кб |
27 |
74.92Кб |
28 |
723.13Кб |
29 |
1.19Мб |
3 |
290.67Кб |
30 |
796.84Кб |
31 |
1.07Мб |
32 |
1.60Мб |
33 |
1.18Мб |
34 |
1.51Мб |
35 |
11.72Кб |
36 |
192.60Кб |
37 |
917.25Кб |
38 |
1.22Мб |
39 |
1.91Мб |
4 |
736.24Кб |
40 |
1.95Мб |
41 |
241.79Кб |
42 |
961.00Кб |
43 |
1.01Мб |
44 |
1.32Мб |
45 |
1.70Мб |
46 |
493.56Кб |
47 |
1.98Мб |
48 |
188.35Кб |
49 |
406.51Кб |
5 |
1.57Мб |
50 |
1.36Мб |
51 |
1.43Мб |
52 |
95.46Кб |
53 |
1.25Мб |
54 |
1.26Мб |
55 |
1.33Мб |
56 |
1.75Мб |
57 |
1.89Мб |
58 |
1.22Мб |
59 |
1.72Мб |
6 |
290.27Кб |
60 |
1.79Мб |
61 |
271.77Кб |
62 |
319.25Кб |
63 |
994.65Кб |
64 |
1.31Мб |
65 |
1.32Мб |
66 |
1.43Мб |
67 |
1.87Мб |
68 |
1.88Мб |
69 |
471.18Кб |
7 |
1.19Мб |
70 |
499.52Кб |
71 |
51.25Кб |
72 |
65.78Кб |
73 |
283.00Кб |
74 |
410.17Кб |
75 |
1.23Мб |
76 |
1.35Мб |
77 |
1.50Мб |
78 |
1.64Мб |
79 |
24.42Кб |
8 |
1.38Мб |
80 |
32.73Кб |
81 |
179.09Кб |
82 |
662.66Кб |
83 |
1.11Мб |
84 |
1.49Мб |
85 |
146.31Кб |
86 |
260.42Кб |
87 |
1.84Мб |
88 |
537.69Кб |
89 |
989.14Кб |
9 |
471.60Кб |
90 |
1.59Мб |
91 |
1.81Мб |
92 |
990.48Кб |
93 |
1.50Мб |
94 |
13.67Кб |
95 |
1.21Мб |
96 |
1.63Мб |
97 |
359.86Кб |
98 |
1.06Мб |
99 |
1.16Мб |
Common Ports.pdf |
94.00Кб |
Encryption.pdf |
223.96Кб |
IPSec VPN.pdf |
78.69Кб |
Notes on Access Control.pdf |
173.12Кб |
Notes on Biometrics.pdf |
204.37Кб |
Notes on IPv4-IPv6.pdf |
3.13Мб |
Notes on Kerberos.pdf |
603.08Кб |
OSI Model.pdf |
100.17Кб |
TutsNode.com.txt |
63б |