Общая информация
Название CompTIA Security+ (SY0-601)
Тип
Размер 26.99Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 2.98Кб
1 12.47Кб
1.1 comptia-secplusy0601.zip 203.65Мб
1. Cryptography Concepts.mp4 328.67Мб
1. Cryptography Concepts.srt 42.87Кб
1. Overview.mp4 101.41Мб
1. Overview.srt 10.64Кб
10 1.08Мб
10. Authentication and Authorization.mp4 380.03Мб
10. Authentication and Authorization.srt 49.51Кб
10. Network Attacks - DNS Attacks.mp4 347.82Мб
10. Network Attacks - DNS Attacks.srt 38.11Кб
11 801.94Кб
11. Authentication Methods.mp4 357.61Мб
11. Authentication Methods.srt 44.03Кб
11. Network Attacks - Layer 2 Attacks.mp4 320.23Мб
11. Network Attacks - Layer 2 Attacks.srt 40.20Кб
12 1.97Мб
12. Additional Authentication Methods.mp4 183.73Мб
12. Additional Authentication Methods.srt 24.38Кб
12. Network Attacks - DoS and DDoS.mp4 217.17Мб
12. Network Attacks - DoS and DDoS.srt 24.57Кб
13 334.22Кб
13. Biometrics.mp4 281.41Мб
13. Biometrics.srt 34.51Кб
13. Network Attacks - MiTM and MiTB.mp4 191.36Мб
13. Network Attacks - MiTM and MiTB.srt 21.19Кб
14 543.37Кб
14. Authentication Protocols - PAP and CHAP.mp4 191.70Мб
14. Authentication Protocols - PAP and CHAP.srt 25.73Кб
14. Network Attacks - Wireless.mp4 354.99Мб
14. Network Attacks - Wireless.srt 39.60Кб
15 1.15Мб
15. Authentication Protocols - EAP and 802.1X.mp4 249.77Мб
15. Authentication Protocols - EAP and 802.1X.srt 29.43Кб
15. Vulnerabilities.mp4 350.14Мб
15. Vulnerabilities.srt 41.01Кб
16 734.31Кб
16. Authentication Protocols - RADIUS and TACACS.mp4 212.03Мб
16. Authentication Protocols - RADIUS and TACACS.srt 28.25Кб
16. Threat Intelligence - OSINT.mp4 204.14Мб
16. Threat Intelligence - OSINT.srt 23.80Кб
17 1.22Мб
17. Authentication Protocols - Kerberos.mp4 186.67Мб
17. Authentication Protocols - Kerberos.srt 22.80Кб
17. Threat Intelligence - Threat Maps and Feeds.mp4 230.85Мб
17. Threat Intelligence - Threat Maps and Feeds.srt 24.77Кб
18 138.84Кб
18. Access Control Schemes.mp4 371.86Мб
18. Access Control Schemes.srt 48.23Кб
18. Threat Intelligence Vulnerability Databases Feed.mp4 321.36Мб
18. Threat Intelligence Vulnerability Databases Feed.srt 35.97Кб
19 833.75Кб
19. Account Management - Account Types.mp4 323.44Мб
19. Account Management - Account Types.srt 44.21Кб
19. Threat Actors and Vectors.mp4 379.47Мб
19. Threat Actors and Vectors.srt 41.97Кб
2 2.55Кб
2. Encryption and Steganography.mp4 239.16Мб
2. Encryption and Steganography.srt 27.94Кб
2. Social Engineering Techniques.mp4 336.55Мб
2. Social Engineering Techniques.srt 42.06Кб
20 1.93Мб
20. Account Management - Password Policies.mp4 226.45Мб
20. Account Management - Password Policies.srt 28.29Кб
21 1.58Мб
21. Account Management - Account Policies.mp4 213.92Мб
21. Account Management - Account Policies.srt 29.00Кб
22 399.15Кб
22. Application Security.mp4 304.31Мб
22. Application Security.srt 38.63Кб
23 1.48Мб
23. Physical Security.mp4 407.18Мб
23. Physical Security.srt 49.81Кб
24 1.01Мб
24. Wireless Security.mp4 407.48Мб
24. Wireless Security.srt 54.00Кб
25 526.23Кб
25. Secure Data Destruction.mp4 280.94Мб
25. Secure Data Destruction.srt 33.48Кб
26 1.36Мб
26. Host Security - Endpoint Protection.mp4 371.19Мб
26. Host Security - Endpoint Protection.srt 47.39Кб
27 1.62Мб
27. Host Security - Hardening.mp4 386.92Мб
27. Host Security - Hardening.srt 50.21Кб
28 1.86Мб
28. Mobile Device Deployment.mp4 345.42Мб
28. Mobile Device Deployment.srt 38.45Кб
29 21.86Кб
29. Mobile Device Management and Enforcement.mp4 347.98Мб
29. Mobile Device Management and Enforcement.srt 44.23Кб
3 3.36Кб
3. Hashing.mp4 315.35Мб
3. Hashing.srt 37.32Кб
3. Malware.mp4 345.19Мб
3. Malware.srt 41.91Кб
30 182.74Кб
30. Mobile Device Connections.mp4 244.66Мб
30. Mobile Device Connections.srt 32.24Кб
31 592.11Кб
31. Specialized Systems.mp4 309.19Мб
31. Specialized Systems.srt 36.19Кб
32 824.89Кб
32. Network Security - Segmentation.mp4 353.49Мб
32. Network Security - Segmentation.srt 42.61Кб
33 750.00Кб
33. Network Security - VPNs.mp4 316.61Мб
33. Network Security - VPNs.srt 38.85Кб
34 537.62Кб
34. Network Security - Proxies and Load Balancing.mp4 277.96Мб
34. Network Security - Proxies and Load Balancing.srt 33.16Кб
35 1.45Мб
35. Network Security - Port Security.mp4 28.04Мб
35. Network Security - Port Security.srt 34.07Кб
36 1.05Мб
36. Network Security - Firewalls.mp4 250.42Мб
36. Network Security - Firewalls.srt 32.67Кб
37 514.36Кб
37. Network Security - NIDS and NIPS.mp4 122.82Мб
37. Network Security - NIDS and NIPS.srt 15.73Кб
38 1.33Мб
38. Virtualization.mp4 356.52Мб
38. Virtualization.srt 44.46Кб
39 576.34Кб
39. Cloud Concepts.mp4 374.78Мб
39. Cloud Concepts.srt 46.84Кб
4 481.50Кб
4. Password Attacks - Types.mp4 212.62Мб
4. Password Attacks - Types.srt 24.56Кб
4. Secure Protocols.mp4 432.87Мб
4. Secure Protocols.srt 48.84Кб
40 659.99Кб
40. Cloud Services.mp4 288.09Мб
40. Cloud Services.srt 37.89Кб
41 1.77Мб
41. Cloud Models.mp4 172.56Мб
41. Cloud Models.srt 20.00Кб
42 1.39Мб
42. Computing Types.mp4 300.11Мб
42. Computing Types.srt 33.86Кб
43 663.80Кб
43. Cloud Security Controls.mp4 292.36Мб
43. Cloud Security Controls.srt 37.32Кб
44 15.64Кб
44. Hardware Redundancy.mp4 429.69Мб
44. Hardware Redundancy.srt 52.79Кб
45 831.82Кб
45. Site Redundancy.mp4 242.15Мб
45. Site Redundancy.srt 30.01Кб
46 716.10Кб
46. Non-persistence Concepts.mp4 331.50Мб
46. Non-persistence Concepts.srt 42.25Кб
47 1.69Мб
47. Backup and Recovery.mp4 364.42Мб
47. Backup and Recovery.srt 47.77Кб
48 1.89Мб
48. Network Reconnaissance and Discovery.mp4 278.17Мб
48. Network Reconnaissance and Discovery.srt 33.98Кб
49 1.64Мб
49. Packet Capture and Replay.mp4 395.20Мб
49. Packet Capture and Replay.srt 54.87Кб
5 42.69Кб
5. Password Attacks - Tools.mp4 236.17Мб
5. Password Attacks - Tools.srt 30.34Кб
5. Symmetric vs. Asymmetric Encryption.mp4 393.98Мб
5. Symmetric vs. Asymmetric Encryption.srt 47.84Кб
50 435.88Кб
50. Vulnerability Scans.mp4 275.10Мб
50. Vulnerability Scans.srt 31.53Кб
51 1.50Мб
51. SIEM and SOAR Systems.mp4 217.93Мб
51. SIEM and SOAR Systems.srt 26.89Кб
52 1.91Мб
52. Pentesting Techniques.mp4 350.38Мб
52. Pentesting Techniques.srt 43.53Кб
53 1.04Мб
53. Pentesting Exercise Types.mp4 268.33Мб
53. Pentesting Exercise Types.srt 31.57Кб
54 603.94Кб
54. Digital Forensics Concepts.mp4 375.28Мб
54. Digital Forensics Concepts.srt 42.92Кб
55 1.06Мб
55. Investigational Data Sources.mp4 388.10Мб
55. Investigational Data Sources.srt 48.22Кб
56 1.83Мб
56. Incident Response Process.mp4 228.02Мб
56. Incident Response Process.srt 28.35Кб
57 39.68Кб
57. Incident Response Plans.mp4 224.57Мб
57. Incident Response Plans.srt 27.69Кб
58 918.91Кб
58. Attack Frameworks.mp4 238.02Мб
58. Attack Frameworks.srt 29.98Кб
59 284.95Кб
59. Security Controls.mp4 307.30Мб
59. Security Controls.srt 40.18Кб
6 820.58Кб
6. Application Attacks - Injections.mp4 289.57Мб
6. Application Attacks - Injections.srt 39.15Кб
6. PKI Concepts.mp4 385.22Мб
6. PKI Concepts.srt 47.81Кб
60 1.67Мб
60. Regulations, Standards and Frameworks.mp4 397.96Мб
60. Regulations, Standards and Frameworks.srt 56.16Кб
61 1.50Мб
61. Spotlight on General Data Protection Regulation.mp4 350.64Мб
61. Spotlight on General Data Protection Regulation.srt 46.87Кб
62 1.58Мб
62. Organizational Security Policies - Personnel.mp4 368.07Мб
62. Organizational Security Policies - Personnel.srt 52.78Кб
63 232.60Кб
63. Organizational Security Policies - 3rd Party Risk.mp4 339.27Мб
63. Organizational Security Policies - 3rd Party Risk.srt 49.65Кб
64 483.79Кб
64. Organizational Security Policies - Data.mp4 260.50Мб
64. Organizational Security Policies - Data.srt 38.66Кб
65 1.34Мб
65. Organizational Security Policies - Other Areas.mp4 214.50Мб
65. Organizational Security Policies - Other Areas.srt 32.19Кб
66 1.85Мб
66. Risk Management Concepts - Vocabulary.mp4 249.53Мб
66. Risk Management Concepts - Vocabulary.srt 32.94Кб
67 855.55Кб
67. Risk Management Concepts - Types & Strategies.mp4 376.85Мб
67. Risk Management Concepts - Types & Strategies.srt 51.48Кб
68 1.98Мб
68. Risk Management Concepts - Risk Analysis.mp4 313.98Мб
68. Risk Management Concepts - Risk Analysis.srt 41.03Кб
69 1.83Мб
69. Risk Management Concepts Business Impact Analysis.mp4 390.13Мб
69. Risk Management Concepts Business Impact Analysis.srt 56.15Кб
7 23.81Кб
7. Application Attacks - System Resources.mp4 337.47Мб
7. Application Attacks - System Resources.srt 40.60Кб
7. Certificates.mp4 332.95Мб
7. Certificates.srt 36.97Кб
70 1.15Мб
70. Privacy and Data Sensitivity Breaches & Data Types.mp4 282.96Мб
70. Privacy and Data Sensitivity Breaches & Data Types.srt 39.14Кб
71 1.98Мб
71. Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 288.50Мб
71. Privacy, Data Sensitivity - Privacy Enhancing Tech.srt 39.14Кб
72 960.96Кб
72. Privacy, Data Sensitivity, Roles, Responsibilities.mp4 227.06Мб
72. Privacy, Data Sensitivity, Roles, Responsibilities.srt 37.58Кб
73 1.55Мб
73. Privacy and Data Sensitivity - Other Areas.mp4 271.72Мб
73. Privacy and Data Sensitivity - Other Areas.srt 29.98Кб
74 1.43Мб
75 66.79Кб
76 853.99Кб
77 1.50Мб
78 82.10Кб
79 1.38Мб
8 1.87Мб
8. Application Attacks - XSS and XSRF.mp4 185.22Мб
8. Application Attacks - XSS and XSRF.srt 24.42Кб
8. Keys.mp4 398.91Мб
8. Keys.srt 46.54Кб
80 1.97Мб
81 776.11Кб
82 1.86Мб
83 358.56Кб
84 304.12Кб
85 650.44Кб
86 1.33Мб
87 796.68Кб
88 280.21Кб
89 1.44Мб
9 1.90Мб
9. Application Attacks - Replay Attacks.mp4 205.24Мб
9. Application Attacks - Replay Attacks.srt 24.27Кб
9. IPSec.mp4 379.67Мб
9. IPSec.srt 43.89Кб
90 1.18Мб
91 607.39Кб
TutsNode.net.txt 63б
Статистика распространения по странам
США (US) 2
Австралия (AU) 2
Иран (IR) 1
Великобритания (GB) 1
Иордания (JO) 1
Китай (CN) 1
Россия (RU) 1
Нидерланды (NL) 1
Южная Корея (KR) 1
Бразилия (BR) 1
Всего 12
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент