Общая информация
Название CompTIA Security+ (SY0-601) Complete Course & Comptia Lab
Тип
Размер 8.63Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 158б
1 68б
1. Basic Network Concepts.mp4 59.61Мб
1. Basic Network Concepts.srt 16.84Кб
1. Brute Force&Dictionary Attacks.mp4 28.45Мб
1. Brute Force&Dictionary Attacks.srt 3.93Кб
1. Checking for Vulnerabilities.mp4 13.77Мб
1. Checking for Vulnerabilities.srt 2.14Кб
1. Code Reuse and SDKs.mp4 28.85Мб
1. Code Reuse and SDKs.srt 4.79Кб
1. Comparing Access Control Models.mp4 7.73Мб
1. Comparing Access Control Models.srt 2.38Кб
1. Comparing Business Continuity Elements.mp4 61.36Мб
1. Comparing Business Continuity Elements.srt 7.40Кб
1. Comparing Physical Security Controls.mp4 34.72Мб
1. Comparing Physical Security Controls.srt 4.19Кб
1. CompTIA Security+ (SY0-601) Complete Course & Comptia Lab.html 266б
1. CompTIA Security+ (SY0-601) Complete Course & Exam Lab Introduction.mp4 58.97Мб
1. CompTIA Security+ (SY0-601) Complete Course & Exam Lab Introduction.srt 14.43Кб
1. Conclusion.mp4 68.27Мб
1. Conclusion.srt 14.62Кб
1. Create a User In Comptia.mp4 9.69Мб
1. Create a User In Comptia.srt 3.58Кб
1. Database Concepts.mp4 15.63Мб
1. Database Concepts.srt 2.89Кб
1. Deploying Mobile Devices Securely.mp4 14.87Мб
1. Deploying Mobile Devices Securely.srt 2.62Кб
1. Disable SSID Broadcasting or Not.mp4 9.15Мб
1. Disable SSID Broadcasting or Not.srt 1.53Кб
1. Disassociation Attacks.mp4 10.33Мб
1. Disassociation Attacks.srt 2.13Кб
1. Exploring Embedded Systems.mp4 87.24Мб
1. Exploring Embedded Systems.srt 8.69Кб
1. Exploring Security Policies.mp4 7.32Мб
1. Exploring Security Policies.srt 1.47Кб
1. Firewalls.mp4 42.19Мб
1. Firewalls.srt 9.80Кб
1. HTTPS Transport Encryption.mp4 29.22Мб
1. HTTPS Transport Encryption.srt 5.33Кб
1. Implementing Secure Systems.mp4 35.92Мб
1. Implementing Secure Systems.srt 5.03Кб
1. Introducing Cryptography Concepts.mp4 16.72Мб
1. Introducing Cryptography Concepts.srt 3.27Кб
1. Memory Leak.mp4 17.93Мб
1. Memory Leak.srt 3.08Кб
1. Monitoring Logs for Event Anomalies.mp4 64.54Мб
1. Monitoring Logs for Event Anomalies.srt 9.99Кб
1. Network Attacks.mp4 22.84Мб
1. Network Attacks.srt 3.93Кб
1. Penetration Tests.mp4 24.01Мб
1. Penetration Tests.srt 3.21Кб
1. Protecting Data.mp4 56.77Мб
1. Protecting Data.srt 12.84Кб
1. Protecting Email.mp4 12.65Мб
1. Protecting Email.srt 2.22Кб
1. Protecting Systems from Malware.mp4 15.59Мб
1. Protecting Systems from Malware.srt 2.31Кб
1. Reviewing Basic Wireless Network Information.mp4 30.79Мб
1. Reviewing Basic Wireless Network Information.srt 7.12Кб
1. Single Point of Failure.mp4 13.67Мб
1. Single Point of Failure.srt 2.29Кб
1. Social Engineering.mp4 28.31Мб
1. Social Engineering.srt 4.97Кб
1. Summary-1.mp4 23.26Мб
1. Summary-1.srt 3.71Кб
1. Summary-2.mp4 29.04Мб
1. Summary-2.srt 3.45Кб
1. Summary-3.mp4 22.39Мб
1. Summary-3.srt 2.89Кб
1. Summary-4.mp4 21.88Мб
1. Summary-4.srt 3.97Кб
1. Summary-5.mp4 32.70Мб
1. Summary-5.srt 4.80Кб
1. Summary-6.mp4 11.18Мб
1. Summary-6.srt 2.44Кб
1. Summary-7.mp4 10.46Мб
1. Summary-7.srt 1.95Кб
1. Understanding Control Types.mp4 54.71Мб
1. Understanding Control Types.srt 8.91Кб
1. Understanding IDSs and IPSs.mp4 32.73Мб
1. Understanding IDSs and IPSs.srt 5.26Кб
1. Understanding Risk Management.mp4 19.16Мб
1. Understanding Risk Management.srt 2.96Кб
1. Understanding Threat Actors.mp4 86.39Мб
1. Understanding Threat Actors.srt 13.09Кб
1. Using VPNs for Remote Access.mp4 21.27Мб
1. Using VPNs for Remote Access.srt 3.81Кб
1. Web Servers.mp4 11.19Мб
1. Web Servers.srt 2.14Кб
1. What is Identity Management.mp4 14.49Мб
1. What is Identity Management.srt 2.57Кб
1. What is Security.mp4 18.30Мб
1. What is Security.srt 2.88Кб
1. What is Virtualization.mp4 13.26Мб
1. What is Virtualization.srt 4.13Кб
1. Zero-Day Attacks.mp4 31.31Мб
1. Zero-Day Attacks.srt 4.75Кб
10 94.20Кб
10. Block Versus Stream Ciphers.mp4 24.21Мб
10. Block Versus Stream Ciphers.srt 4.78Кб
10. Cloud Deployment Models.mp4 32.56Мб
10. Cloud Deployment Models.srt 6.26Кб
10. Configuring NAT Network in Oracle VM VirtualBox.mp4 14.98Мб
10. Configuring NAT Network in Oracle VM VirtualBox.srt 959б
10. Network Separation.mp4 12.63Мб
10. Network Separation.srt 3.76Кб
10. Nmap with Ping Scan.mp4 60.69Мб
10. Nmap with Ping Scan.srt 6.06Кб
10. Quiz.html 203б
10. Quiz.html 203б
10. Quiz.html 203б
10. Quiz.html 203б
10. Quiz.html 203б
10. Quiz.html 203б
10. Quiz.html 203б
10. Rogue Access Points-Evil-Twin-Attack.mp4 43.71Мб
10. Rogue Access Points-Evil-Twin-Attack.srt 6.22Кб
10. Troubleshooting Personnel Issues.mp4 17.43Мб
10. Troubleshooting Personnel Issues.srt 2.80Кб
10. Vishing.mp4 26.95Мб
10. Vishing.srt 3.57Кб
10. Zed Attack Proxy (ZAP)_ A Web App Vulnerability Scanner.mp4 12.33Мб
10. Zed Attack Proxy (ZAP)_ A Web App Vulnerability Scanner.srt 3.90Кб
100 418.07Кб
101 447.86Кб
102 1015.95Кб
103 701.55Кб
104 737.13Кб
105 818.33Кб
106 216.02Кб
107 454.74Кб
108 547.64Кб
109 10.25Кб
11 266.93Кб
11. Beware of Email from Friends.mp4 22.87Мб
11. Beware of Email from Friends.srt 2.25Кб
11. Cloud Services.mp4 44.06Мб
11. Cloud Services.srt 7.31Кб
11. Cracking-WEP-Preparing-Attacks.mp4 20.04Мб
11. Cracking-WEP-Preparing-Attacks.srt 3.16Кб
11. Nmap with TCP Scan.mp4 65.09Мб
11. Nmap with TCP Scan.srt 9.43Кб
11. Proxy Servers.mp4 44.82Мб
11. Proxy Servers.srt 7.91Кб
11. Quiz.html 203б
11. Quiz.html 203б
11. Quiz.html 203б
11. Quiz.html 203б
11. Quiz.html 203б
11. Quiz.html 203б
11. Quiz.html 203б
11. Symmetric Encryption.mp4 12.58Мб
11. Symmetric Encryption.srt 1.98Кб
11. XSS (Cross Site Scripting) - Stored and DOM Based XSS.mp4 54.91Мб
11. XSS (Cross Site Scripting) - Stored and DOM Based XSS.srt 8.20Кб
110 14.08Кб
111 186.32Кб
112 216.47Кб
113 492.72Кб
114 619.52Кб
115 797.68Кб
116 979.90Кб
117 152.51Кб
118 425.99Кб
119 562.11Кб
12 868.22Кб
12. Cracking-WEP-Fake-Authentication-Attack.mp4 28.01Мб
12. Cracking-WEP-Fake-Authentication-Attack.srt 4.00Кб
12. Cross Site Request Forgery (CSRF).mp4 47.63Мб
12. Cross Site Request Forgery (CSRF).srt 6.18Кб
12. Nmap with Version Detection.mp4 77.54Мб
12. Nmap with Version Detection.srt 6.45Кб
12. Quiz.html 203б
12. Quiz.html 203б
12. Quiz.html 203б
12. Quiz.html 203б
12. Quiz.html 203б
12. Quiz.html 203б
12. Security Responsibilities with Cloud Models.mp4 12.67Мб
12. Security Responsibilities with Cloud Models.srt 2.02Кб
12. Symmetric Encryption Methods.mp4 38.31Мб
12. Symmetric Encryption Methods.srt 6.79Кб
12. Types of Using Network Technologies-1.mp4 51.59Мб
12. Types of Using Network Technologies-1.srt 9.04Кб
12. Why Social Engineering Works.mp4 56.92Мб
12. Why Social Engineering Works.srt 11.30Кб
120 708.20Кб
121 1010.03Кб
122 37.52Кб
123 340.92Кб
124 627.40Кб
125 647.82Кб
126 48.40Кб
127 132.33Кб
128 1007.21Кб
129 498.92Кб
13 96.24Кб
13. Asymmetric Encryption.mp4 11.26Мб
13. Asymmetric Encryption.srt 2.17Кб
13. Cracking-WEP-ChopChop-Attack.mp4 41.10Мб
13. Cracking-WEP-ChopChop-Attack.srt 3.66Кб
13. Nmap with Operating System Detection.mp4 77.23Мб
13. Nmap with Operating System Detection.srt 8.22Кб
13. Path Traversal_ File.mp4 53.61Мб
13. Path Traversal_ File.srt 6.27Кб
13. Quiz.html 203б
13. Quiz.html 203б
13. Quiz.html 203б
13. Social Engineering Toolkit (SET) for Phishing.mp4 76.97Мб
13. Social Engineering Toolkit (SET) for Phishing.srt 7.04Кб
13. Types of Using Network Technologies-2.mp4 39.56Мб
13. Types of Using Network Technologies-2.srt 8.65Кб
130 664.24Кб
131 968.92Кб
132 7.94Кб
133 109.68Кб
134 602.02Кб
135 754.47Кб
136 804.76Кб
137 816.20Кб
138 956.91Кб
139 984.63Кб
14 172.50Кб
14. Active Scan with Hping.mp4 101.94Мб
14. Active Scan with Hping.srt 10.27Кб
14. Certificates.mp4 29.82Мб
14. Certificates.srt 4.45Кб
14. Cracking-WPA-Aircrack-ng.mp4 36.04Мб
14. Cracking-WPA-Aircrack-ng.srt 4.00Кб
14. Quiz.html 203б
14. Quiz.html 203б
14. Quiz.html 203б
14. Quiz.html 203б
140 1015.73Кб
141 447.59Кб
142 662.80Кб
143 756.17Кб
144 826.98Кб
145 127.22Кб
146 138.20Кб
147 161.46Кб
148 414.40Кб
149 484.35Кб
15 193.50Кб
15. Cracking-WPA-John-the-Ripper.mp4 45.07Мб
15. Cracking-WPA-John-the-Ripper.srt 4.19Кб
15. Quiz.html 203б
15. Quiz.html 203б
15. Quiz.html 203б
15. Quiz.html 203б
15. Steganography And Obfuscation.mp4 31.28Мб
15. Steganography And Obfuscation.srt 3.02Кб
15. Wireless Scanners Cracker.mp4 29.39Мб
15. Wireless Scanners Cracker.srt 3.74Кб
150 579.43Кб
151 625.54Кб
152 764.17Кб
153 892.94Кб
154 972.50Кб
155 982.72Кб
156 126.11Кб
157 743.03Кб
158 892.71Кб
159 964.35Кб
16 581.95Кб
16. Banner Grabbing.mp4 5.78Мб
16. Banner Grabbing.srt 942б
16. Quiz.html 203б
16. Quiz.html 203б
16. Quiz.html 203б
16. Quiz.html 203б
16. Using Cryptographic Protocols.mp4 9.84Мб
16. Using Cryptographic Protocols.srt 2.03Кб
160 421.64Кб
161 430.94Кб
162 817.67Кб
163 896.85Кб
164 983.35Кб
165 267.92Кб
166 388.71Кб
167 409.50Кб
168 434.69Кб
169 450.96Кб
17 263.48Кб
17. Cipher Suites.mp4 15.44Мб
17. Cipher Suites.srt 3.73Кб
17. Quiz.html 203б
17. Vulnerability Scanning.mp4 98.94Мб
17. Vulnerability Scanning.srt 13.31Кб
170 587.22Кб
171 863.58Кб
172 974.91Кб
173 988.53Кб
174 244.82Кб
175 374.77Кб
176 437.58Кб
177 713.36Кб
178 798.16Кб
179 67.17Кб
18 472.35Кб
18. Exploring PKI Components.mp4 47.97Мб
18. Exploring PKI Components.srt 8.98Кб
18. Introduction to Vulnerability Scan.mp4 62.31Мб
18. Introduction to Vulnerability Scan.srt 11.40Кб
18. Quiz.html 203б
180 103.64Кб
181 149.87Кб
182 156.12Кб
183 242.79Кб
184 289.75Кб
185 584.78Кб
186 705.02Кб
187 875.65Кб
188 1015.47Кб
189 28.93Кб
19 785.13Кб
19. Introduction to Nessus.mp4 7.18Мб
19. Introduction to Nessus.srt 2.30Кб
19. Recovery Agent.mp4 7.18Мб
19. Recovery Agent.srt 1.20Кб
190 65.07Кб
191 93.69Кб
192 98.58Кб
193 188.24Кб
194 290.35Кб
195 35.41Кб
196 112.32Кб
197 351.22Кб
198 377.42Кб
199 417.95Кб
2 103б
2. Antivirus and Anti-Malware Software.mp4 57.14Мб
2. Antivirus and Anti-Malware Software.srt 9.31Кб
2. Buffer Overflow Attacks.mp4 27.67Мб
2. Buffer Overflow Attacks.srt 4.80Кб
2. Cain & Abel_ A Brute Force Attack.mp4 100.76Мб
2. Cain & Abel_ A Brute Force Attack.srt 10.60Кб
2. Code Quality and Testing.mp4 19.43Мб
2. Code Quality and Testing.srt 3.12Кб
2. Comparing Door Lock Types.mp4 37.29Мб
2. Comparing Door Lock Types.srt 6.48Кб
2. Control Goals.mp4 82.74Мб
2. Control Goals.srt 12.73Кб
2. Data Loss Prevention.mp4 45.41Мб
2. Data Loss Prevention.srt 6.61Кб
2. Deployment Models.mp4 97.22Мб
2. Deployment Models.srt 10.10Кб
2. Detection Methods.mp4 78.43Мб
2. Detection Methods.srt 12.36Кб
2. Disk Redundancies.mp4 42.07Мб
2. Disk Redundancies.srt 5.25Кб
2. Domain Name Services(DNS).mp4 41.95Мб
2. Domain Name Services(DNS).srt 9.69Кб
2. Enable MAC Filtering.mp4 13.04Мб
2. Enable MAC Filtering.srt 1.95Кб
2. Encrypting Email.mp4 22.88Мб
2. Encrypting Email.srt 3.78Кб
2. FAQ CompTIA Security Plus (SY0-601) Course Comptia Security+.html 11.03Кб
2. Hashing.mp4 23.19Мб
2. Hashing.srt 5.70Кб
2. Impact.mp4 32.01Мб
2. Impact.srt 4.54Кб
2. KERBEROS & NTLM&LDAP.mp4 22.05Мб
2. KERBEROS & NTLM&LDAP.srt 8.23Кб
2. Managing Accounts-1.mp4 40.14Мб
2. Managing Accounts-1.srt 14.32Кб
2. Network Access Control.mp4 48.92Мб
2. Network Access Control.srt 10.06Кб
2. Normalization.mp4 33.04Мб
2. Normalization.srt 6.16Кб
2. Operating systems.mp4 16.91Мб
2. Operating systems.srt 5.15Кб
2. Other Logs-SIEM.mp4 55.34Мб
2. Other Logs-SIEM.srt 8.38Кб
2. Passive & Active Reconnaissance.mp4 13.41Мб
2. Passive & Active Reconnaissance.srt 2.25Кб
2. Password Crackers.mp4 11.86Мб
2. Password Crackers.srt 2.30Кб
2. Personnel Management Policies.mp4 72.29Мб
2. Personnel Management Policies.srt 12.47Кб
2. Privacy-Integrity-Availability.mp4 15.25Мб
2. Privacy-Integrity-Availability.srt 4.03Кб
2. Quiz.html 203б
2. Quiz.html 203б
2. Risk Management.mp4 19.58Мб
2. Risk Management.srt 3.10Кб
2. Role-Based Access Control.mp4 17.31Мб
2. Role-Based Access Control.srt 3.71Кб
2. Shoulder Surfing.mp4 7.13Мб
2. Shoulder Surfing.srt 1.31Кб
2. SQL Injection Attacks.mp4 24.89Мб
2. SQL Injection Attacks.srt 5.08Кб
2. SYN Flood Attack.mp4 16.97Мб
2. SYN Flood Attack.srt 3.36Кб
2. Understanding Stuxnet.mp4 17.90Мб
2. Understanding Stuxnet.srt 2.63Кб
2. Virtualization Technologies.mp4 9.79Мб
2. Virtualization Technologies.srt 3.25Кб
2. Viruses.mp4 12.52Мб
2. Viruses.srt 2.31Кб
2. VPN Tunnel Protocols.mp4 40.66Мб
2. VPN Tunnel Protocols.srt 6.24Кб
2. Wireless Cryptographic Protocols.mp4 35.86Мб
2. Wireless Cryptographic Protocols.srt 7.51Кб
2. WPS and WPS Attacks.mp4 11.28Мб
2. WPS and WPS Attacks.srt 1.97Кб
20 35.10Кб
20. Comparing Certificate Types.mp4 22.13Мб
20. Comparing Certificate Types.srt 5.59Кб
20. Nessus_ First Scan.mp4 45.59Мб
20. Nessus_ First Scan.srt 8.82Кб
200 435.65Кб
201 577.75Кб
202 766.56Кб
203 815.41Кб
204 16.21Кб
205 133.32Кб
206 211.64Кб
207 339.39Кб
208 481.20Кб
209 489.80Кб
21 627.73Кб
21. Certificate Formats.mp4 12.70Мб
21. Certificate Formats.srt 3.05Кб
21. Quiz.html 203б
210 495.41Кб
211 527.09Кб
212 614.42Кб
213 772.08Кб
214 910.16Кб
215 207.50Кб
216 238.45Кб
217 341.68Кб
218 449.40Кб
219 506.98Кб
22 559.32Кб
22. Quiz.html 203б
22. Quiz.html 203б
220 607.66Кб
221 757.36Кб
222 984.97Кб
223 178.78Кб
224 305.01Кб
225 333.46Кб
226 357.68Кб
227 374.25Кб
228 431.94Кб
229 491.25Кб
23 722.35Кб
23. Quiz.html 203б
23. Quiz.html 203б
230 690.81Кб
231 874.57Кб
232 975.33Кб
233 1006.71Кб
234 146.53Кб
235 189.62Кб
236 694.55Кб
237 734.50Кб
238 759.64Кб
239 775.39Кб
24 980.56Кб
24. Quiz.html 203б
240 831.72Кб
241 840.29Кб
242 230.53Кб
243 308.62Кб
244 557.45Кб
245 600.87Кб
246 683.42Кб
247 1016.72Кб
248 2.01Кб
249 46.52Кб
25 746.76Кб
250 54.69Кб
251 162.45Кб
252 215.89Кб
253 321.29Кб
254 719.43Кб
255 724.62Кб
256 874.18Кб
257 205.00Кб
258 484.59Кб
259 902.90Кб
26 963.11Кб
260 273.66Кб
261 698.86Кб
262 776.28Кб
263 841.68Кб
264 842.00Кб
265 895.81Кб
266 708.50Кб
267 957.15Кб
268 118.08Кб
269 177.80Кб
27 933.47Кб
270 226.49Кб
271 968.65Кб
272 449.18Кб
28 375.39Кб
29 470.68Кб
3 49б
3. Advanced Malware Tools.mp4 21.13Мб
3. Advanced Malware Tools.srt 4.05Кб
3. Authentication Protocols for Wireless Networks.mp4 30.47Мб
3. Authentication Protocols for Wireless Networks.srt 6.57Кб
3. Background Check.mp4 19.56Мб
3. Background Check.srt 3.50Кб
3. Benefits of Virtualization.mp4 24.41Мб
3. Benefits of Virtualization.srt 5.76Кб
3. Cain & Abel_ A Dictionary Attack.mp4 40.18Мб
3. Cain & Abel_ A Dictionary Attack.srt 4.44Кб
3. Continuous Monitoring.mp4 34.52Мб
3. Continuous Monitoring.srt 7.69Кб
3. Development Life-Cycle Models.mp4 24.04Мб
3. Development Life-Cycle Models.srt 4.13Кб
3. Encryption and Access Control.mp4 13.50Мб
3. Encryption and Access Control.srt 3.44Кб
3. Establishing Access with Group-Based Privileges.mp4 14.52Мб
3. Establishing Access with Group-Based Privileges.srt 5.59Кб
3. Honeypots.mp4 34.67Мб
3. Honeypots.srt 4.97Кб
3. Implementing a Secure Network.mp4 32.70Мб
3. Implementing a Secure Network.srt 5.52Кб
3. Initial Exploitation.mp4 26.87Мб
3. Initial Exploitation.srt 4.21Кб
3. Logic Bombs.mp4 16.82Мб
3. Logic Bombs.srt 3.62Кб
3. MAC Flood Attacks.mp4 17.76Мб
3. MAC Flood Attacks.srt 3.30Кб
3. Managing Accounts-2.mp4 43.69Мб
3. Managing Accounts-2.srt 11.05Кб
3. MD5.mp4 4.56Мб
3. MD5.srt 982б
3. Mobile Device Management.mp4 72.45Мб
3. Mobile Device Management.srt 11.51Кб
3. Password Cracking Tools.mp4 851.60Кб
3. Password Cracking Tools.srt 197б
3. Pointer Dereference.mp4 14.40Мб
3. Pointer Dereference.srt 2.42Кб
3. Preventing Tailgating with Mantraps.mp4 14.52Мб
3. Preventing Tailgating with Mantraps.srt 2.17Кб
3. Protecting Against SQL Injection Attacks.mp4 17.72Мб
3. Protecting Against SQL Injection Attacks.srt 2.87Кб
3. Quiz.html 203б
3. Quiz.html 203б
3. Quiz.html 203б
3. Quiz.html 203б
3. Quiz.html 203б
3. Quiz.html 203б
3. Real-Time Operating Systems.mp4 29.99Мб
3. Real-Time Operating Systems.srt 3.96Кб
3. Recovery Time Objective.mp4 35.24Мб
3. Recovery Time Objective.srt 5.83Кб
3. Rogue AP.mp4 9.95Мб
3. Rogue AP.srt 2.65Кб
3. Secure Operating System Configurations.mp4 42.53Мб
3. Secure Operating System Configurations.srt 7.87Кб
3. Server Redundancy and High Availability.mp4 46.45Мб
3. Server Redundancy and High Availability.srt 10.90Кб
3. Single Sign-On.mp4 39.45Мб
3. Single Sign-On.srt 12.32Кб
3. Site-to-Site VPNs.mp4 20.59Мб
3. Site-to-Site VPNs.srt 2.63Кб
3. SQL Queries.mp4 10.41Мб
3. SQL Queries.srt 1.95Кб
3. Threats and Threat Assessments.mp4 27.37Мб
3. Threats and Threat Assessments.srt 5.18Кб
3. Tricking Users with Hoaxes.mp4 5.88Мб
3. Tricking Users with Hoaxes.srt 1.38Кб
3. What is the port How does it work.mp4 23.35Мб
3. What is the port How does it work.srt 4.94Кб
30 703.34Кб
31 657.75Кб
32 319.31Кб
33 403.16Кб
34 34.93Кб
35 883.31Кб
36 85.55Кб
37 234.70Кб
38 674.42Кб
39 674.82Кб
4 52.50Кб
4. 3 A Rule (Authentication, Authorization and Accounting).mp4 15.66Мб
4. 3 A Rule (Authentication, Authorization and Accounting).srt 5.08Кб
4. Backup.mp4 96.29Мб
4. Backup.srt 19.49Кб
4. Compiled Versus Runtime Code.mp4 7.24Мб
4. Compiled Versus Runtime Code.srt 1.49Кб
4. Database Security.mp4 5.05Мб
4. Database Security.srt 1.18Кб
4. Educating Users.mp4 13.56Мб
4. Educating Users.srt 2.27Кб
4. Evil Twin.mp4 11.32Мб
4. Evil Twin.srt 2.38Кб
4. Hydra_ Cracking the Password of a Web App.mp4 108.00Мб
4. Hydra_ Cracking the Password of a Web App.srt 10.99Кб
4. Increasing Physical Security with Guards.mp4 68.06Мб
4. Increasing Physical Security with Guards.srt 9.73Кб
4. MAC Flood Using Macof.mp4 84.91Мб
4. MAC Flood Using Macof.srt 8.22Кб
4. NDA.mp4 32.94Мб
4. NDA.srt 5.36Кб
4. Password Hashes.mp4 25.51Мб
4. Password Hashes.srt 4.70Кб
4. Passwords.mp4 36.68Мб
4. Passwords.srt 10.62Кб
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Quiz.html 203б
4. Recovery Sites.mp4 52.70Мб
4. Recovery Sites.srt 7.12Кб
4. Resiliency and Automation Strategies.mp4 32.59Мб
4. Resiliency and Automation Strategies.srt 5.71Кб
4. Rule Based and Discretionary Access Control.mp4 25.35Мб
4. Rule Based and Discretionary Access Control.srt 6.41Кб
4. Secure DevOps.mp4 18.76Мб
4. Secure DevOps.srt 3.53Кб
4. Security Issues of Virtualization.mp4 14.53Мб
4. Security Issues of Virtualization.srt 4.24Кб
4. SHA.mp4 17.14Мб
4. SHA.srt 2.74Кб
4. Smart Cards.mp4 11.24Мб
4. Smart Cards.srt 3.52Кб
4. SQL Injection - Part I.mp4 20.20Мб
4. SQL Injection - Part I.srt 4.85Кб
4. Tailgating and Mantraps.mp4 5.83Мб
4. Tailgating and Mantraps.srt 1.42Кб
4. Trojans.mp4 27.39Мб
4. Trojans.srt 5.92Кб
4. Unauthorized Software.mp4 36.11Мб
4. Unauthorized Software.srt 5.80Кб
4. Vulnerabilities.mp4 10.70Мб
4. Vulnerabilities.srt 2.62Кб
4. What is the Network Address.mp4 32.90Мб
4. What is the Network Address.srt 7.01Кб
4. White, Gray and Black Box Testing.mp4 17.85Мб
4. White, Gray and Black Box Testing.srt 3.59Кб
40 799.93Кб
41 93.65Кб
42 297.50Кб
43 403.09Кб
44 623.21Кб
45 304.84Кб
46 419.25Кб
47 600.31Кб
48 188.63Кб
49 77.96Кб
5 798.55Кб
5. Cain and Abel_ Gathering Hashes.mp4 80.91Мб
5. Cain and Abel_ Gathering Hashes.srt 4.92Кб
5. Change Management Policy.mp4 46.43Мб
5. Change Management Policy.srt 8.57Кб
5. Combining the IP Address and the Port.mp4 22.04Мб
5. Combining the IP Address and the Port.srt 4.65Кб
5. Create Lab Download and Install VirtualBox.mp4 53.39Мб
5. Create Lab Download and Install VirtualBox.srt 5.70Кб
5. Disaster Recovery.mp4 64.63Мб
5. Disaster Recovery.srt 9.45Кб
5. Dumpster Diving.mp4 9.30Мб
5. Dumpster Diving.srt 1.46Кб
5. Hardware Control.mp4 19.60Мб
5. Hardware Control.srt 3.21Кб
5. HMAC.mp4 15.89Мб
5. HMAC.srt 3.10Кб
5. Implementing Defense in Depth.mp4 26.02Мб
5. Implementing Defense in Depth.srt 4.65Кб
5. Intrusive and Non-Intrusive Testing.mp4 8.53Мб
5. Intrusive and Non-Intrusive Testing.srt 1.67Кб
5. Jamming Attacks.mp4 24.07Мб
5. Jamming Attacks.srt 4.16Кб
5. Mandatory Access Control.mp4 9.29Мб
5. Mandatory Access Control.srt 3.01Кб
5. Man-in-the-Middle Attacks.mp4 10.00Мб
5. Man-in-the-Middle Attacks.srt 1.65Кб
5. Password Cracking with Cain & Aibel.mp4 4.24Мб
5. Password Cracking with Cain & Aibel.srt 1.21Кб
5. Password Policy.mp4 49.82Мб
5. Password Policy.srt 10.34Кб
5. Policy Violations and Adverse Actions.mp4 12.15Мб
5. Policy Violations and Adverse Actions.srt 1.84Кб
5. Proper Input Validation.mp4 24.26Мб
5. Proper Input Validation.srt 4.79Кб
5. Quiz.html 203б
5. Quiz.html 203б
5. Quiz.html 203б
5. Quiz.html 203б
5. Quiz.html 203б
5. Quiz.html 203б
5. Quiz.html 203б
5. Quiz.html 203б
5. Quiz.html 203б
5. Quiz.html 203б
5. Quiz.html 203б
5. Ransomware.mp4 17.01Мб
5. Ransomware.srt 3.58Кб
5. Risk Assessment.mp4 77.74Мб
5. Risk Assessment.srt 15.61Кб
5. SQL Injection - Part II.mp4 47.77Мб
5. SQL Injection - Part II.srt 4.92Кб
5. Threat.mp4 22.25Мб
5. Threat.srt 4.85Кб
5. Tokens or Key Fobs.mp4 18.57Мб
5. Tokens or Key Fobs.srt 6.15Кб
5. Using Hardware Locks.mp4 27.96Мб
5. Using Hardware Locks.srt 3.69Кб
5. Version Control and Change Management.mp4 16.90Мб
5. Version Control and Change Management.srt 2.39Кб
50 28.58Кб
51 235.78Кб
52 383.57Кб
53 567.11Кб
54 588.16Кб
55 674.31Кб
56 41.47Кб
57 420.96Кб
58 606.21Кб
59 950.65Кб
6 726.42Кб
6. Agreement Types.mp4 19.03Мб
6. Agreement Types.srt 3.24Кб
6. ARP Poisoning Attacks.mp4 22.53Мб
6. ARP Poisoning Attacks.srt 3.77Кб
6. Asset Management.mp4 30.56Мб
6. Asset Management.srt 2.99Кб
6. Biometric Methods.mp4 37.02Мб
6. Biometric Methods.srt 8.96Кб
6. Birthday Attacks.mp4 31.20Мб
6. Birthday Attacks.srt 5.21Кб
6. Bluetooth Attacks.mp4 19.05Мб
6. Bluetooth Attacks.srt 3.17Кб
6. Establishing Access Attribute-Based Access Control.mp4 21.06Мб
6. Establishing Access Attribute-Based Access Control.srt 6.50Кб
6. Hashing Files.mp4 18.22Мб
6. Hashing Files.srt 3.41Кб
6. Install Virtual Kali Linux-1.mp4 23.56Мб
6. Install Virtual Kali Linux-1.srt 1.88Кб
6. Network Scan Types.mp4 14.79Мб
6. Network Scan Types.srt 3.39Кб
6. Passive Versus Active Tools.mp4 85.36Мб
6. Passive Versus Active Tools.srt 12.37Кб
6. Provisioning and Deprovisioning.mp4 10.77Мб
6. Provisioning and Deprovisioning.srt 2.04Кб
6. Quiz.html 203б
6. Quiz.html 203б
6. Quiz.html 203б
6. Quiz.html 203б
6. Quiz.html 203б
6. Quiz.html 203б
6. Quiz.html 203б
6. Quiz.html 203б
6. Quiz.html 203б
6. Quiz.html 203б
6. Risk Registers.mp4 39.97Мб
6. Risk Registers.srt 7.33Кб
6. Secure Staging and Deployment.mp4 38.31Мб
6. Secure Staging and Deployment.srt 6.47Кб
6. Side Input Validation.mp4 20.12Мб
6. Side Input Validation.srt 3.75Кб
6. Spyware.mp4 16.94Мб
6. Spyware.srt 3.40Кб
6. SQL Injection - Part III.mp4 50.41Мб
6. SQL Injection - Part III.srt 5.54Кб
6. Switches.mp4 28.58Мб
6. Switches.srt 5.76Кб
6. Unauthorized Connections.mp4 22.60Мб
6. Unauthorized Connections.srt 3.06Кб
6. Watering Hole Attacks.mp4 8.12Мб
6. Watering Hole Attacks.srt 1.27Кб
6. What is a Hacker.mp4 25.05Мб
6. What is a Hacker.srt 8.40Кб
60 180.64Кб
61 225.14Кб
62 958.71Кб
63 296.73Кб
64 313.77Кб
65 478.24Кб
66 832.40Кб
67 951.33Кб
68 47.84Кб
69 825.96Кб
7 774.39Кб
7. Avoiding Race Conditions.mp4 15.97Мб
7. Avoiding Race Conditions.srt 3.00Кб
7. Bots and Botnets.mp4 24.99Мб
7. Bots and Botnets.srt 4.55Кб
7. Bridge.mp4 12.05Мб
7. Bridge.srt 3.32Кб
7. Digital Signatures, Certificates and non-repudiation.mp4 19.62Мб
7. Digital Signatures, Certificates and non-repudiation.srt 3.90Кб
7. DLL Injection.mp4 14.11Мб
7. DLL Injection.srt 2.52Кб
7. DNS Attacks.mp4 44.78Мб
7. DNS Attacks.srt 6.24Кб
7. Dual-Factor and Multifactor Authentication.mp4 6.31Мб
7. Dual-Factor and Multifactor Authentication.srt 1.75Кб
7. Implementing Environmental Controls.mp4 122.02Мб
7. Implementing Environmental Controls.srt 16.29Кб
7. Install Virtual Kali Linux-2.mp4 81.15Мб
7. Install Virtual Kali Linux-2.srt 6.61Кб
7. Passive Scan with Wireshark.mp4 78.81Мб
7. Passive Scan with Wireshark.srt 7.44Кб
7. Peripherals.mp4 35.97Мб
7. Peripherals.srt 4.81Кб
7. PII and PHI.mp4 29.99Мб
7. PII and PHI.srt 5.65Кб
7. Quiz.html 203б
7. Quiz.html 203б
7. Quiz.html 203б
7. Quiz.html 203б
7. Quiz.html 203б
7. Quiz.html 203б
7. Quiz.html 203б
7. Quiz.html 203б
7. Quiz.html 203б
7. Quiz.html 203б
7. Replay Attacks.mp4 20.58Мб
7. Replay Attacks.srt 3.56Кб
7. RFID Attacks.mp4 15.57Мб
7. RFID Attacks.srt 2.96Кб
7. Spam.mp4 13.80Мб
7. Spam.srt 2.47Кб
7. What is Attack What are the Stages.mp4 12.83Мб
7. What is Attack What are the Stages.srt 3.86Кб
70 920.30Кб
71 343.75Кб
72 839.56Кб
73 879.88Кб
74 35.38Кб
75 452.53Кб
76 563.28Кб
77 705.03Кб
78 709.85Кб
79 9.40Кб
8 629.66Кб
8. Cross-Site Scripting.mp4 36.10Мб
8. Cross-Site Scripting.srt 7.20Кб
8. EMI and EMP.mp4 79.83Мб
8. EMI and EMP.srt 8.70Кб
8. Hashing Messages.mp4 29.52Мб
8. Hashing Messages.srt 5.19Кб
8. Hijacking and Related Attacks.mp4 37.28Мб
8. Hijacking and Related Attacks.srt 6.54Кб
8. Install Virtual Kali Linux-3.mp4 55.22Мб
8. Install Virtual Kali Linux-3.srt 6.14Кб
8. PAP CHAP MS-CHAP.mp4 12.02Мб
8. PAP CHAP MS-CHAP.srt 3.07Кб
8. Passive Scan with ARP Tables.mp4 74.39Мб
8. Passive Scan with ARP Tables.srt 7.79Кб
8. Phishing.mp4 41.19Мб
8. Phishing.srt 7.65Кб
8. Proper Error Handling.mp4 14.67Мб
8. Proper Error Handling.srt 2.62Кб
8. Quiz.html 203б
8. Quiz.html 203б
8. Quiz.html 203б
8. Quiz.html 203б
8. Quiz.html 203б
8. Quiz.html 203б
8. Quiz.html 203б
8. Quiz.html 203б
8. Quiz.html 203б
8. Quiz.html 203б
8. Responding to Incidents.mp4 11.81Мб
8. Responding to Incidents.srt 3.03Кб
8. Routers.mp4 55.34Мб
8. Routers.srt 9.50Кб
8. Single Point Of Failure (SPOF).mp4 19.74Мб
8. Single Point Of Failure (SPOF).srt 3.69Кб
8. Unified Threat Management(UTM).mp4 37.99Мб
8. Unified Threat Management(UTM).srt 6.18Кб
8. Wireless Replay Attacks.mp4 10.01Мб
8. Wireless Replay Attacks.srt 1.83Кб
80 729.36Кб
81 732.84Кб
82 1000.56Кб
83 329.02Кб
84 910.70Кб
85 919.10Кб
86 978.21Кб
87 26.40Кб
88 86.53Кб
89 140.92Кб
9 654.55Кб
9. Classification of Web Attacks.mp4 6.07Мб
9. Classification of Web Attacks.srt 2.07Кб
9. Cryptographic Techniques.mp4 8.80Мб
9. Cryptographic Techniques.srt 2.04Кб
9. Driver Manipulation.mp4 15.20Мб
9. Driver Manipulation.srt 2.47Кб
9. Hardware Security Module.mp4 22.43Мб
9. Hardware Security Module.srt 2.57Кб
9. Introducing Basic Risk Concepts.mp4 9.95Мб
9. Introducing Basic Risk Concepts.srt 3.58Кб
9. OWASP Broken Web Applications.mp4 45.96Мб
9. OWASP Broken Web Applications.srt 5.08Кб
9. Providing Confidentiality with Encryption.mp4 46.34Мб
9. Providing Confidentiality with Encryption.srt 8.79Кб
9. Providing Training.mp4 29.79Мб
9. Providing Training.srt 6.58Кб
9. Quiz.html 203б
9. Quiz.html 203б
9. Quiz.html 203б
9. Quiz.html 203б
9. Quiz.html 203б
9. Quiz.html 203б
9. Quiz.html 203б
9. Quiz.html 203б
9. RADIUS.mp4 18.63Мб
9. RADIUS.srt 6.71Кб
9. Rogue Access Points-Airbase-ng.mp4 71.04Мб
9. Rogue Access Points-Airbase-ng.srt 6.52Кб
9. Understanding NAT and PAT.mp4 14.25Мб
9. Understanding NAT and PAT.srt 2.74Кб
9. Whaling.mp4 17.85Мб
9. Whaling.srt 3.11Кб
9. What is NMAP.mp4 24.20Мб
9. What is NMAP.srt 5.57Кб
90 781.90Кб
91 286.93Кб
92 339.54Кб
93 488.52Кб
94 978.12Кб
95 62.63Кб
96 100.68Кб
97 279.77Кб
98 308.09Кб
99 309.61Кб
TutsNode.com.txt 63б
Статистика распространения по странам
США (US) 2
Вьетнам (VN) 1
Греция (GR) 1
Польша (PL) 1
Всего 5
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент