Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
189.91Кб |
1 |
154.91Кб |
1.1 1.Contrast & Compare Information Security Roles - CompTIA Security+ Attacks, Threats and Vulnerabilities.pdf |
5.36Мб |
1.1 1.Encryption, Cryptography it's types and Cryptographic algorithms.pdf |
5.20Мб |
1.1 Incident Management.pdf |
2.75Мб |
1.1 Information Security Governance.pdf |
3.80Мб |
1. Compare and Contrast Information Security Roles.mp4 |
65.00Мб |
1. Encryption, Cryptography, types of Cryptography and Cryptographic algorithms.mp4 |
204.81Мб |
1. Incident Management.mp4 |
50.66Мб |
1. Information Security Governance.mp4 |
54.42Мб |
1. Penetration Testing Concepts.mp4 |
105.74Мб |
1. Wireless Networks & Security Controls.mp4 |
149.29Мб |
10 |
119.75Кб |
11 |
8.59Кб |
12 |
492.57Кб |
13 |
636.19Кб |
14 |
802.28Кб |
15 |
894.37Кб |
16 |
362.28Кб |
17 |
784.46Кб |
18 |
37.37Кб |
19 |
807.24Кб |
2 |
124.86Кб |
2.1 11. Identity Management Controls.pdf |
2.40Мб |
2.1 2.Compare and Contrast Security Controls and Framework Types.pdf |
3.22Мб |
2.1 2. Digital Signatures & Digital Certificates.pdf |
986.03Кб |
2.1 8.Penetration Testing Concepts in detail.pdf |
9.78Мб |
2.1 Digital Forensics.pdf |
2.61Мб |
2.1 Information Security Programs.pdf |
4.79Мб |
2.2 How To Use (And Not Use) The NIST CSF.html |
123б |
2. Compare and Contrast Security Controls and Framework Types.mp4 |
90.52Мб |
2. Digital Forensics.mp4 |
51.15Мб |
2. Digital Signatures & Digital Certificates.mp4 |
94.99Мб |
2. Identity Management Controls.mp4 |
90.22Мб |
2. Information gathering.mp4 |
88.13Мб |
2. Information Security programs.mp4 |
96.61Мб |
20 |
418.70Кб |
21 |
126.83Кб |
22 |
595.78Кб |
23 |
746.31Кб |
24 |
32.31Кб |
25 |
866.40Кб |
26 |
351.95Кб |
27 |
833.68Кб |
28 |
533.62Кб |
29 |
604.03Кб |
3 |
276.37Кб |
3.1 3. Digital certificate Authorities.pdf |
953.66Кб |
3.1 3.Types of Threat Actors and Attack Vectors.pdf |
5.30Мб |
3.1 Cloud, Virtualization, BYOD and Security Testing.pdf |
8.16Мб |
3.1 Risk Management.pdf |
5.52Мб |
3. Cloud, Virtualization, BYOD & Security Testing.mp4 |
125.73Мб |
3. Digital Certificate Authorities.mp4 |
43.19Мб |
3. Risk Management.mp4 |
54.88Мб |
3. Scanning.mp4 |
40.05Мб |
3. Types of Threat Actors and Attack Vectors.mp4 |
68.65Мб |
30 |
15.13Кб |
31 |
148.11Кб |
32 |
493.24Кб |
33 |
991.11Кб |
34 |
51.40Кб |
35 |
226.32Кб |
36 |
855.05Кб |
37 |
494.87Кб |
38 |
656.54Кб |
39 |
718.93Кб |
4 |
56.18Кб |
4.1 4. Public Key Infrastructure - PKI.pdf |
3.48Мб |
4.1 4.Threat Intelligence & Threat research Sources.pdf |
602.94Кб |
4.1 Implementing Personnel Policies.pdf |
2.34Мб |
4. Exploitation.mp4 |
17.52Мб |
4. Implementing Personnel Policies.mp4 |
54.27Мб |
4. Public Key Infastructure.mp4 |
52.97Мб |
4. Threat Intelligence & Threat Research.mp4 |
95.88Мб |
40 |
821.02Кб |
41 |
124.64Кб |
42 |
200.59Кб |
43 |
214.42Кб |
44 |
497.39Кб |
45 |
203.05Кб |
46 |
476.54Кб |
47 |
528.75Кб |
48 |
802.79Кб |
49 |
223.32Кб |
5 |
287.93Кб |
5.1 12.Implementing Account Policies & Authorization Solutions.pdf |
1.23Мб |
5.1 5. Commands used in Assessing Network layout & Security.pdf |
793.42Кб |
5.1 5. PKI Management.pdf |
3.53Мб |
5. Account Policies & Authorization.mp4 |
40.41Мб |
5. Commands used in Assessing Network layout & Security.mp4 |
105.95Мб |
5. PKI Management.mp4 |
102.56Мб |
5. Post Exploitation Maintaining access.mp4 |
41.48Мб |
50 |
256.48Кб |
51 |
395.54Кб |
52 |
447.75Кб |
53 |
612.77Кб |
54 |
679.99Кб |
55 |
323.33Кб |
6 |
52.13Кб |
6.1 6.Identification, Authentication & Access Control Systems.pdf |
1.68Мб |
6.1 6. Security concerns regarding Vulnerabilities.pdf |
2.56Мб |
6. Identification, Authentication & Access Control Systems.mp4 |
33.86Мб |
6. Reporting.mp4 |
12.95Мб |
6. Security concerns regarding Vulnerabilities.mp4 |
62.21Мб |
7 |
270.15Кб |
7.1 7.Vulnerability Scanning Techniques and Vulnerability scores & exposures.pdf |
2.78Мб |
7. Knowledge based Authentication.mp4 |
113.72Мб |
7. Vulnerability Scanning Techniques and Vulnerability scores & exposures.mp4 |
58.59Мб |
8 |
448.66Кб |
8.1 8. Technology implementing Secure Authentication.pdf |
4.88Мб |
8.1 9.Social Engineering Attacks & Principles.pdf |
4.80Мб |
8. Social Engineering Attacks & Principles.mp4 |
123.17Мб |
8. Technology behind Secure Authentication.mp4 |
90.38Мб |
9 |
403.61Кб |
9.1 10.Malware and Types of malwares.pdf |
4.51Мб |
9.1 9. Biometric Authentication Concepts.pdf |
15.03Мб |
9. Biometric Authentication.mp4 |
175.85Мб |
9. Malware and Types of malwares.mp4 |
65.23Мб |
TutsNode.net.txt |
63б |