Общая информация
Название CompTIA Security Plus
Тип
Размер 4.91Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
1.10 TCP IP Internet Protocol.mp4 147.88Мб
1.11 Common Protocols and their Port Numbers.mp4 129.28Мб
1.12 Security Related Issues Wireless Part 1.mp4 140.81Мб
1.13 Security Related Issues Wireless Part 2.mp4 55.22Мб
1.1 Firewalls.mp4 155.01Мб
1.2 Proxies.mp4 81.86Мб
1.3 Reverse Proxies.mp4 16.18Мб
1.4 Network Address Translation.mp4 23.47Мб
1.5 VPN Concentrators.mp4 18.32Мб
1.6 Network Administration Principles.mp4 129.45Мб
1.7 Subnetting.mp4 152.51Мб
1.8 Subnet Mask.mp4 28.32Мб
1.9 Network Design and Elements.mp4 194.09Мб
2.10 Importance Of Security Awareness And Training.mp4 130.43Мб
2.11 Physical Security And Environmental Controls.mp4 136.40Мб
2.12 Risk Management Best Practices.mp4 177.36Мб
2.13 Goals Of Security.mp4 115.04Мб
2.1 Risk Related Concepts (Part 1).mp4 83.35Мб
2.2 Risk Related Concepts (Part 2).mp4 167.72Мб
2.3 Control Types.mp4 25.84Мб
2.4 The Principle of Least Priviledge.mp4 16.28Мб
2.5 Security Implications of Integrating Systems (Part 1).mp4 65.94Мб
2.6 Security Implications of Integrating Systems (Part 2).mp4 56.13Мб
2.7 Basic Forensic Procedures.mp4 79.74Мб
2.8 Incident Response Procedures.mp4 60.38Мб
2.9 Importance Of Security.mp4 97.80Мб
3.10 Mitigation and Deterrent Techniques.mp4 76.29Мб
3.11 Security Traits and Vulnerabilities.mp4 72.46Мб
3.12 Assesment Techniques.mp4 39.00Мб
3.13 Penetration Testing vs Vulnerability Scanning (Part 1).mp4 45.15Мб
3.14 Penetration Testing vs Vulnerability Scanning (Part 2).mp4 40.16Мб
3.1 Types Of Malware (Part 1).mp4 132.63Мб
3.2 Types Of Malware (Part 2).mp4 80.44Мб
3.3 Phishing.mp4 151.79Мб
3.4 Various Types of Attacks.mp4 73.46Мб
3.5 Social Engineering.mp4 85.39Мб
3.6 Types Of Wireless Attacks.mp4 61.33Мб
3.7 Application Attacks.mp4 36.41Мб
3.8 Attacks (LDAP, XML) Injection.mp4 39.74Мб
3.9 Zero Day Exploits, Cookies and Attachments.mp4 45.12Мб
4.1 Applications, Security Controls and Techniques.mp4 96.86Мб
4.2 Host Security.mp4 118.70Мб
4.3 Hardware Security.mp4 72.38Мб
4.4 Virtualization.mp4 62.05Мб
4.5 Importance of Data Security.mp4 89.70Мб
4.6 Data Security.mp4 24.94Мб
4.7 Data Encryption.mp4 68.98Мб
4.8 Data Policies.mp4 35.31Мб
5.1 Authentication Services.mp4 40.89Мб
5.2 Access Controls.mp4 64.91Мб
5.3 Authentication Authorization and Access Control (Part 1).mp4 88.84Мб
5.4 Authentication Authorization and Access Control (Part 2).mp4 121.68Мб
5.5 Authentication Factors.mp4 50.21Мб
5.6 Implementing Appropriate Security Controls When Performing Account Management.mp4 106.58Мб
5.7 Best Practices For Account Management.mp4 123.94Мб
6.1 General Cryptography Concepts.mp4 49.52Мб
6.2 Block Cyphers & Stream Cyphers.mp4 18.11Мб
6.3 Transport Encryption.mp4 20.56Мб
6.4 Hashing & Steganography.mp4 100.73Мб
6.5 WEP, WPA and WPA2.mp4 29.06Мб
6.6 MD5, SHA and AES.mp4 35.03Мб
6.7 DES, HMAC and CHAP.mp4 72.92Мб
6.8 Public Key Infrastructure.mp4 71.37Мб
Статистика распространения по странам
Турция (TR) 1
США (US) 1
Всего 2
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент