Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
2.98Кб |
1 |
12.47Кб |
1.1 comptia-secplusy0601.zip |
203.65Мб |
1. Cryptography Concepts.mp4 |
328.67Мб |
1. Cryptography Concepts.srt |
42.87Кб |
1. Overview.mp4 |
101.41Мб |
1. Overview.srt |
10.64Кб |
10 |
1.08Мб |
10. Authentication and Authorization.mp4 |
380.03Мб |
10. Authentication and Authorization.srt |
49.51Кб |
10. Network Attacks - DNS Attacks.mp4 |
347.82Мб |
10. Network Attacks - DNS Attacks.srt |
38.11Кб |
11 |
801.94Кб |
11. Authentication Methods.mp4 |
357.61Мб |
11. Authentication Methods.srt |
44.03Кб |
11. Network Attacks - Layer 2 Attacks.mp4 |
320.23Мб |
11. Network Attacks - Layer 2 Attacks.srt |
40.20Кб |
12 |
1.97Мб |
12. Additional Authentication Methods.mp4 |
183.73Мб |
12. Additional Authentication Methods.srt |
24.38Кб |
12. Network Attacks - DoS and DDoS.mp4 |
217.17Мб |
12. Network Attacks - DoS and DDoS.srt |
24.57Кб |
13 |
334.22Кб |
13. Biometrics.mp4 |
281.41Мб |
13. Biometrics.srt |
34.51Кб |
13. Network Attacks - MiTM and MiTB.mp4 |
191.36Мб |
13. Network Attacks - MiTM and MiTB.srt |
21.19Кб |
14 |
543.37Кб |
14. Authentication Protocols - PAP and CHAP.mp4 |
191.70Мб |
14. Authentication Protocols - PAP and CHAP.srt |
25.73Кб |
14. Network Attacks - Wireless.mp4 |
354.99Мб |
14. Network Attacks - Wireless.srt |
39.60Кб |
15 |
1.15Мб |
15. Authentication Protocols - EAP and 802.1X.mp4 |
249.77Мб |
15. Authentication Protocols - EAP and 802.1X.srt |
29.43Кб |
15. Vulnerabilities.mp4 |
350.14Мб |
15. Vulnerabilities.srt |
41.01Кб |
16 |
734.31Кб |
16. Authentication Protocols - RADIUS and TACACS.mp4 |
212.03Мб |
16. Authentication Protocols - RADIUS and TACACS.srt |
28.25Кб |
16. Threat Intelligence - OSINT.mp4 |
204.14Мб |
16. Threat Intelligence - OSINT.srt |
23.80Кб |
17 |
1.22Мб |
17. Authentication Protocols - Kerberos.mp4 |
186.67Мб |
17. Authentication Protocols - Kerberos.srt |
22.80Кб |
17. Threat Intelligence - Threat Maps and Feeds.mp4 |
230.85Мб |
17. Threat Intelligence - Threat Maps and Feeds.srt |
24.77Кб |
18 |
138.84Кб |
18. Access Control Schemes.mp4 |
371.86Мб |
18. Access Control Schemes.srt |
48.23Кб |
18. Threat Intelligence Vulnerability Databases Feed.mp4 |
321.36Мб |
18. Threat Intelligence Vulnerability Databases Feed.srt |
35.97Кб |
19 |
833.75Кб |
19. Account Management - Account Types.mp4 |
323.44Мб |
19. Account Management - Account Types.srt |
44.21Кб |
19. Threat Actors and Vectors.mp4 |
379.47Мб |
19. Threat Actors and Vectors.srt |
41.97Кб |
2 |
2.55Кб |
2. Encryption and Steganography.mp4 |
239.16Мб |
2. Encryption and Steganography.srt |
27.94Кб |
2. Social Engineering Techniques.mp4 |
336.55Мб |
2. Social Engineering Techniques.srt |
42.06Кб |
20 |
1.93Мб |
20. Account Management - Password Policies.mp4 |
226.45Мб |
20. Account Management - Password Policies.srt |
28.29Кб |
21 |
1.58Мб |
21. Account Management - Account Policies.mp4 |
213.92Мб |
21. Account Management - Account Policies.srt |
29.00Кб |
22 |
399.15Кб |
22. Application Security.mp4 |
304.31Мб |
22. Application Security.srt |
38.63Кб |
23 |
1.48Мб |
23. Physical Security.mp4 |
407.18Мб |
23. Physical Security.srt |
49.81Кб |
24 |
1.01Мб |
24. Wireless Security.mp4 |
407.48Мб |
24. Wireless Security.srt |
54.00Кб |
25 |
526.23Кб |
25. Secure Data Destruction.mp4 |
280.94Мб |
25. Secure Data Destruction.srt |
33.48Кб |
26 |
1.36Мб |
26. Host Security - Endpoint Protection.mp4 |
371.19Мб |
26. Host Security - Endpoint Protection.srt |
47.39Кб |
27 |
1.62Мб |
27. Host Security - Hardening.mp4 |
386.92Мб |
27. Host Security - Hardening.srt |
50.21Кб |
28 |
1.86Мб |
28. Mobile Device Deployment.mp4 |
345.42Мб |
28. Mobile Device Deployment.srt |
38.45Кб |
29 |
21.86Кб |
29. Mobile Device Management and Enforcement.mp4 |
347.98Мб |
29. Mobile Device Management and Enforcement.srt |
44.23Кб |
3 |
3.36Кб |
3. Hashing.mp4 |
315.35Мб |
3. Hashing.srt |
37.32Кб |
3. Malware.mp4 |
345.19Мб |
3. Malware.srt |
41.91Кб |
30 |
182.74Кб |
30. Mobile Device Connections.mp4 |
244.66Мб |
30. Mobile Device Connections.srt |
32.24Кб |
31 |
592.11Кб |
31. Specialized Systems.mp4 |
309.19Мб |
31. Specialized Systems.srt |
36.19Кб |
32 |
824.89Кб |
32. Network Security - Segmentation.mp4 |
353.49Мб |
32. Network Security - Segmentation.srt |
42.61Кб |
33 |
750.00Кб |
33. Network Security - VPNs.mp4 |
316.61Мб |
33. Network Security - VPNs.srt |
38.85Кб |
34 |
537.62Кб |
34. Network Security - Proxies and Load Balancing.mp4 |
277.96Мб |
34. Network Security - Proxies and Load Balancing.srt |
33.16Кб |
35 |
1.45Мб |
35. Network Security - Port Security.mp4 |
28.04Мб |
35. Network Security - Port Security.srt |
34.07Кб |
36 |
1.05Мб |
36. Network Security - Firewalls.mp4 |
250.42Мб |
36. Network Security - Firewalls.srt |
32.67Кб |
37 |
514.36Кб |
37. Network Security - NIDS and NIPS.mp4 |
122.82Мб |
37. Network Security - NIDS and NIPS.srt |
15.73Кб |
38 |
1.33Мб |
38. Virtualization.mp4 |
356.52Мб |
38. Virtualization.srt |
44.46Кб |
39 |
576.34Кб |
39. Cloud Concepts.mp4 |
374.78Мб |
39. Cloud Concepts.srt |
46.84Кб |
4 |
481.50Кб |
4. Password Attacks - Types.mp4 |
212.62Мб |
4. Password Attacks - Types.srt |
24.56Кб |
4. Secure Protocols.mp4 |
432.87Мб |
4. Secure Protocols.srt |
48.84Кб |
40 |
659.99Кб |
40. Cloud Services.mp4 |
288.09Мб |
40. Cloud Services.srt |
37.89Кб |
41 |
1.77Мб |
41. Cloud Models.mp4 |
172.56Мб |
41. Cloud Models.srt |
20.00Кб |
42 |
1.39Мб |
42. Computing Types.mp4 |
300.11Мб |
42. Computing Types.srt |
33.86Кб |
43 |
663.80Кб |
43. Cloud Security Controls.mp4 |
292.36Мб |
43. Cloud Security Controls.srt |
37.32Кб |
44 |
15.64Кб |
44. Hardware Redundancy.mp4 |
429.69Мб |
44. Hardware Redundancy.srt |
52.79Кб |
45 |
831.82Кб |
45. Site Redundancy.mp4 |
242.15Мб |
45. Site Redundancy.srt |
30.01Кб |
46 |
716.10Кб |
46. Non-persistence Concepts.mp4 |
331.50Мб |
46. Non-persistence Concepts.srt |
42.25Кб |
47 |
1.69Мб |
47. Backup and Recovery.mp4 |
364.42Мб |
47. Backup and Recovery.srt |
47.77Кб |
48 |
1.89Мб |
48. Network Reconnaissance and Discovery.mp4 |
278.17Мб |
48. Network Reconnaissance and Discovery.srt |
33.98Кб |
49 |
1.64Мб |
49. Packet Capture and Replay.mp4 |
395.20Мб |
49. Packet Capture and Replay.srt |
54.87Кб |
5 |
42.69Кб |
5. Password Attacks - Tools.mp4 |
236.17Мб |
5. Password Attacks - Tools.srt |
30.34Кб |
5. Symmetric vs. Asymmetric Encryption.mp4 |
393.98Мб |
5. Symmetric vs. Asymmetric Encryption.srt |
47.84Кб |
50 |
435.88Кб |
50. Vulnerability Scans.mp4 |
275.10Мб |
50. Vulnerability Scans.srt |
31.53Кб |
51 |
1.50Мб |
51. SIEM and SOAR Systems.mp4 |
217.93Мб |
51. SIEM and SOAR Systems.srt |
26.89Кб |
52 |
1.91Мб |
52. Pentesting Techniques.mp4 |
350.38Мб |
52. Pentesting Techniques.srt |
43.53Кб |
53 |
1.04Мб |
53. Pentesting Exercise Types.mp4 |
268.33Мб |
53. Pentesting Exercise Types.srt |
31.57Кб |
54 |
603.94Кб |
54. Digital Forensics Concepts.mp4 |
375.28Мб |
54. Digital Forensics Concepts.srt |
42.92Кб |
55 |
1.06Мб |
55. Investigational Data Sources.mp4 |
388.10Мб |
55. Investigational Data Sources.srt |
48.22Кб |
56 |
1.83Мб |
56. Incident Response Process.mp4 |
228.02Мб |
56. Incident Response Process.srt |
28.35Кб |
57 |
39.68Кб |
57. Incident Response Plans.mp4 |
224.57Мб |
57. Incident Response Plans.srt |
27.69Кб |
58 |
918.91Кб |
58. Attack Frameworks.mp4 |
238.02Мб |
58. Attack Frameworks.srt |
29.98Кб |
59 |
284.95Кб |
59. Security Controls.mp4 |
307.30Мб |
59. Security Controls.srt |
40.18Кб |
6 |
820.58Кб |
6. Application Attacks - Injections.mp4 |
289.57Мб |
6. Application Attacks - Injections.srt |
39.15Кб |
6. PKI Concepts.mp4 |
385.22Мб |
6. PKI Concepts.srt |
47.81Кб |
60 |
1.67Мб |
60. Regulations, Standards and Frameworks.mp4 |
397.96Мб |
60. Regulations, Standards and Frameworks.srt |
56.16Кб |
61 |
1.50Мб |
61. Spotlight on General Data Protection Regulation.mp4 |
350.64Мб |
61. Spotlight on General Data Protection Regulation.srt |
46.87Кб |
62 |
1.58Мб |
62. Organizational Security Policies - Personnel.mp4 |
368.07Мб |
62. Organizational Security Policies - Personnel.srt |
52.78Кб |
63 |
232.60Кб |
63. Organizational Security Policies - 3rd Party Risk.mp4 |
339.27Мб |
63. Organizational Security Policies - 3rd Party Risk.srt |
49.65Кб |
64 |
483.79Кб |
64. Organizational Security Policies - Data.mp4 |
260.50Мб |
64. Organizational Security Policies - Data.srt |
38.66Кб |
65 |
1.34Мб |
65. Organizational Security Policies - Other Areas.mp4 |
214.50Мб |
65. Organizational Security Policies - Other Areas.srt |
32.19Кб |
66 |
1.85Мб |
66. Risk Management Concepts - Vocabulary.mp4 |
249.53Мб |
66. Risk Management Concepts - Vocabulary.srt |
32.94Кб |
67 |
855.55Кб |
67. Risk Management Concepts - Types & Strategies.mp4 |
376.85Мб |
67. Risk Management Concepts - Types & Strategies.srt |
51.48Кб |
68 |
1.98Мб |
68. Risk Management Concepts - Risk Analysis.mp4 |
313.98Мб |
68. Risk Management Concepts - Risk Analysis.srt |
41.03Кб |
69 |
1.83Мб |
69. Risk Management Concepts Business Impact Analysis.mp4 |
390.13Мб |
69. Risk Management Concepts Business Impact Analysis.srt |
56.15Кб |
7 |
23.81Кб |
7. Application Attacks - System Resources.mp4 |
337.47Мб |
7. Application Attacks - System Resources.srt |
40.60Кб |
7. Certificates.mp4 |
332.95Мб |
7. Certificates.srt |
36.97Кб |
70 |
1.15Мб |
70. Privacy and Data Sensitivity Breaches & Data Types.mp4 |
282.96Мб |
70. Privacy and Data Sensitivity Breaches & Data Types.srt |
39.14Кб |
71 |
1.98Мб |
71. Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 |
288.50Мб |
71. Privacy, Data Sensitivity - Privacy Enhancing Tech.srt |
39.14Кб |
72 |
960.96Кб |
72. Privacy, Data Sensitivity, Roles, Responsibilities.mp4 |
227.06Мб |
72. Privacy, Data Sensitivity, Roles, Responsibilities.srt |
37.58Кб |
73 |
1.55Мб |
73. Privacy and Data Sensitivity - Other Areas.mp4 |
271.72Мб |
73. Privacy and Data Sensitivity - Other Areas.srt |
29.98Кб |
74 |
1.43Мб |
75 |
66.79Кб |
76 |
853.99Кб |
77 |
1.50Мб |
78 |
82.10Кб |
79 |
1.38Мб |
8 |
1.87Мб |
8. Application Attacks - XSS and XSRF.mp4 |
185.22Мб |
8. Application Attacks - XSS and XSRF.srt |
24.42Кб |
8. Keys.mp4 |
398.91Мб |
8. Keys.srt |
46.54Кб |
80 |
1.97Мб |
81 |
776.11Кб |
82 |
1.86Мб |
83 |
358.56Кб |
84 |
304.12Кб |
85 |
650.44Кб |
86 |
1.33Мб |
87 |
796.68Кб |
88 |
280.21Кб |
89 |
1.44Мб |
9 |
1.90Мб |
9. Application Attacks - Replay Attacks.mp4 |
205.24Мб |
9. Application Attacks - Replay Attacks.srt |
24.27Кб |
9. IPSec.mp4 |
379.67Мб |
9. IPSec.srt |
43.89Кб |
90 |
1.18Мб |
91 |
607.39Кб |
TutsNode.net.txt |
63б |