Общая информация
Название Core Cyber Security Concepts
Тип
Размер 2.79Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 189.91Кб
1 154.91Кб
1.1 1.Contrast & Compare Information Security Roles - CompTIA Security+ Attacks, Threats and Vulnerabilities.pdf 5.36Мб
1.1 1.Encryption, Cryptography it's types and Cryptographic algorithms.pdf 5.20Мб
1.1 Incident Management.pdf 2.75Мб
1.1 Information Security Governance.pdf 3.80Мб
1. Compare and Contrast Information Security Roles.mp4 65.00Мб
1. Encryption, Cryptography, types of Cryptography and Cryptographic algorithms.mp4 204.81Мб
1. Incident Management.mp4 50.66Мб
1. Information Security Governance.mp4 54.42Мб
1. Penetration Testing Concepts.mp4 105.74Мб
1. Wireless Networks & Security Controls.mp4 149.29Мб
10 119.75Кб
11 8.59Кб
12 492.57Кб
13 636.19Кб
14 802.28Кб
15 894.37Кб
16 362.28Кб
17 784.46Кб
18 37.37Кб
19 807.24Кб
2 124.86Кб
2.1 11. Identity Management Controls.pdf 2.40Мб
2.1 2.Compare and Contrast Security Controls and Framework Types.pdf 3.22Мб
2.1 2. Digital Signatures & Digital Certificates.pdf 986.03Кб
2.1 8.Penetration Testing Concepts in detail.pdf 9.78Мб
2.1 Digital Forensics.pdf 2.61Мб
2.1 Information Security Programs.pdf 4.79Мб
2.2 How To Use (And Not Use) The NIST CSF.html 123б
2. Compare and Contrast Security Controls and Framework Types.mp4 90.52Мб
2. Digital Forensics.mp4 51.15Мб
2. Digital Signatures & Digital Certificates.mp4 94.99Мб
2. Identity Management Controls.mp4 90.22Мб
2. Information gathering.mp4 88.13Мб
2. Information Security programs.mp4 96.61Мб
20 418.70Кб
21 126.83Кб
22 595.78Кб
23 746.31Кб
24 32.31Кб
25 866.40Кб
26 351.95Кб
27 833.68Кб
28 533.62Кб
29 604.03Кб
3 276.37Кб
3.1 3. Digital certificate Authorities.pdf 953.66Кб
3.1 3.Types of Threat Actors and Attack Vectors.pdf 5.30Мб
3.1 Cloud, Virtualization, BYOD and Security Testing.pdf 8.16Мб
3.1 Risk Management.pdf 5.52Мб
3. Cloud, Virtualization, BYOD & Security Testing.mp4 125.73Мб
3. Digital Certificate Authorities.mp4 43.19Мб
3. Risk Management.mp4 54.88Мб
3. Scanning.mp4 40.05Мб
3. Types of Threat Actors and Attack Vectors.mp4 68.65Мб
30 15.13Кб
31 148.11Кб
32 493.24Кб
33 991.11Кб
34 51.40Кб
35 226.32Кб
36 855.05Кб
37 494.87Кб
38 656.54Кб
39 718.93Кб
4 56.18Кб
4.1 4. Public Key Infrastructure - PKI.pdf 3.48Мб
4.1 4.Threat Intelligence & Threat research Sources.pdf 602.94Кб
4.1 Implementing Personnel Policies.pdf 2.34Мб
4. Exploitation.mp4 17.52Мб
4. Implementing Personnel Policies.mp4 54.27Мб
4. Public Key Infastructure.mp4 52.97Мб
4. Threat Intelligence & Threat Research.mp4 95.88Мб
40 821.02Кб
41 124.64Кб
42 200.59Кб
43 214.42Кб
44 497.39Кб
45 203.05Кб
46 476.54Кб
47 528.75Кб
48 802.79Кб
49 223.32Кб
5 287.93Кб
5.1 12.Implementing Account Policies & Authorization Solutions.pdf 1.23Мб
5.1 5. Commands used in Assessing Network layout & Security.pdf 793.42Кб
5.1 5. PKI Management.pdf 3.53Мб
5. Account Policies & Authorization.mp4 40.41Мб
5. Commands used in Assessing Network layout & Security.mp4 105.95Мб
5. PKI Management.mp4 102.56Мб
5. Post Exploitation Maintaining access.mp4 41.48Мб
50 256.48Кб
51 395.54Кб
52 447.75Кб
53 612.77Кб
54 679.99Кб
55 323.33Кб
6 52.13Кб
6.1 6.Identification, Authentication & Access Control Systems.pdf 1.68Мб
6.1 6. Security concerns regarding Vulnerabilities.pdf 2.56Мб
6. Identification, Authentication & Access Control Systems.mp4 33.86Мб
6. Reporting.mp4 12.95Мб
6. Security concerns regarding Vulnerabilities.mp4 62.21Мб
7 270.15Кб
7.1 7.Vulnerability Scanning Techniques and Vulnerability scores & exposures.pdf 2.78Мб
7. Knowledge based Authentication.mp4 113.72Мб
7. Vulnerability Scanning Techniques and Vulnerability scores & exposures.mp4 58.59Мб
8 448.66Кб
8.1 8. Technology implementing Secure Authentication.pdf 4.88Мб
8.1 9.Social Engineering Attacks & Principles.pdf 4.80Мб
8. Social Engineering Attacks & Principles.mp4 123.17Мб
8. Technology behind Secure Authentication.mp4 90.38Мб
9 403.61Кб
9.1 10.Malware and Types of malwares.pdf 4.51Мб
9.1 9. Biometric Authentication Concepts.pdf 15.03Мб
9. Biometric Authentication.mp4 175.85Мб
9. Malware and Types of malwares.mp4 65.23Мб
TutsNode.net.txt 63б
Статистика распространения по странам
Индия (IN) 2
Великобритания (GB) 1
Малайзия (MY) 1
Всего 4
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент