Create Tool:
Create Time:1970-01-01 08:00:00
File Size:2.37 GB
File Count:208
File Hash:48003321319e824e4c6fdd2939f26785f22b6ff9
0. Websites you may like/[CourserHub.com].url | 123 B |
Readme.txt | 51 B |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/04_introduction.en.srt | 5.73 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/04_introduction.en.txt | 3.71 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/04_introduction.mp4 | 25.73 MB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/05_about-the-instructor.en.srt | 10.38 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/05_about-the-instructor.en.txt | 6.18 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/05_about-the-instructor.mp4 | 155.29 MB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.en.srt | 8.04 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.en.txt | 4.89 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.mp4 | 39.08 MB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/02_what-is-personal-computing.en.srt | 6.79 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/02_what-is-personal-computing.en.txt | 4.21 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/02_what-is-personal-computing.mp4 | 28.98 MB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/03_what-is-enterprise-computing.en.srt | 12.41 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/03_what-is-enterprise-computing.en.txt | 7.46 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/03_what-is-enterprise-computing.mp4 | 52.12 MB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/04_what-roles-are-there-in-system-management.en.srt | 6.35 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/04_what-roles-are-there-in-system-management.en.txt | 3.90 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/04_what-roles-are-there-in-system-management.mp4 | 27.84 MB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/05_what-is-going-to-prepare-me-for-practical-system-management.en.srt | 8.07 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/05_what-is-going-to-prepare-me-for-practical-system-management.en.txt | 4.96 KB |
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/05_what-is-going-to-prepare-me-for-practical-system-management.mp4 | 35.36 MB |
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/01_why-do-we-need-to-learn-networking.en.srt | 9.58 KB |
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/01_why-do-we-need-to-learn-networking.en.txt | 5.82 KB |
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/01_why-do-we-need-to-learn-networking.mp4 | 46.40 MB |
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/05_osi-model.en.srt | 8.60 KB |
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/05_osi-model.en.txt | 5.22 KB |
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/05_osi-model.mp4 | 36.71 MB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/01_what-is-virtualization.en.srt | 7.34 KB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/01_what-is-virtualization.en.txt | 4.53 KB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/01_what-is-virtualization.mp4 | 37.90 MB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/02_types-of-virtualization.en.srt | 8.93 KB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/02_types-of-virtualization.en.txt | 5.55 KB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/02_types-of-virtualization.mp4 | 38.41 MB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/03_when-to-use-and-not-use-virtualization.en.srt | 7.14 KB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/03_when-to-use-and-not-use-virtualization.en.txt | 4.20 KB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/03_when-to-use-and-not-use-virtualization.mp4 | 33.38 MB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/04_your-computer-vs-an-enterprise-system.en.srt | 7.92 KB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/04_your-computer-vs-an-enterprise-system.en.txt | 5.11 KB |
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/04_your-computer-vs-an-enterprise-system.mp4 | 33.83 MB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/01_why-information-security-in-the-first-place.en.srt | 7.55 KB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/01_why-information-security-in-the-first-place.en.txt | 4.74 KB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/01_why-information-security-in-the-first-place.mp4 | 31.83 MB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/03_what-is-a-secure-computer.en.srt | 5.22 KB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/03_what-is-a-secure-computer.en.txt | 3.24 KB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/03_what-is-a-secure-computer.mp4 | 22.06 MB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/04_risk-in-system-management.en.srt | 12.79 KB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/04_risk-in-system-management.en.txt | 7.74 KB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/04_risk-in-system-management.mp4 | 53.73 MB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/05_confidentiality-integrity-and-availability.en.srt | 9.70 KB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/05_confidentiality-integrity-and-availability.en.txt | 5.91 KB |
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/05_confidentiality-integrity-and-availability.mp4 | 46.50 MB |
linux-server-management-security/0. Websites you may like/[CourserHub.com].url | 123 B |
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/01_introduction.en.srt | 5.59 KB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/01_introduction.en.txt | 3.38 KB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/01_introduction.mp4 | 21.99 MB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/04_about-the-instructor.en.srt | 10.56 KB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/04_about-the-instructor.en.txt | 6.23 KB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/04_about-the-instructor.mp4 | 155.29 MB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/01_linux-in-the-enterprise.en.srt | 10.32 KB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/01_linux-in-the-enterprise.en.txt | 6.32 KB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/01_linux-in-the-enterprise.mp4 | 44.04 MB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/02_about-linux-and-distributions.en.srt | 10.76 KB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/02_about-linux-and-distributions.en.txt | 6.29 KB |
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/02_about-linux-and-distributions.mp4 | 46.82 MB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/01_enterprise-install-of-centos.en.srt | 4.92 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/01_enterprise-install-of-centos.en.txt | 3.07 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/01_enterprise-install-of-centos.mp4 | 8.52 MB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/03_networking-in-linux.en.srt | 7.31 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/03_networking-in-linux.en.txt | 4.33 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/03_networking-in-linux.mp4 | 11.34 MB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/05_sudo.en.srt | 6.87 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/05_sudo.en.txt | 4.06 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/05_sudo.mp4 | 13.44 MB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/06_ssh.en.srt | 12.87 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/06_ssh.en.txt | 7.37 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/06_ssh.mp4 | 24.59 MB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/08_cron.en.srt | 5.50 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/08_cron.en.txt | 3.35 KB |
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/08_cron.mp4 | 7.21 MB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/01_adding-users.en.srt | 5.43 KB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/01_adding-users.en.txt | 3.21 KB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/01_adding-users.mp4 | 7.94 MB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/03_securing-users.en.srt | 8.15 KB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/03_securing-users.en.txt | 4.74 KB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/03_securing-users.mp4 | 14.74 MB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/05_access-control.en.srt | 8.97 KB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/05_access-control.en.txt | 5.35 KB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/05_access-control.mp4 | 13.61 MB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/06_working-with-other-systems.en.srt | 10.17 KB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/06_working-with-other-systems.en.txt | 6.08 KB |
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/06_working-with-other-systems.mp4 | 44.73 MB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/01_selinux.en.srt | 9.01 KB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/01_selinux.en.txt | 5.33 KB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/01_selinux.mp4 | 37.71 MB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/03_linux-security.en.srt | 13.32 KB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/03_linux-security.en.txt | 8.06 KB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/03_linux-security.mp4 | 61.12 MB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/04_software-firewalls-in-linux.en.srt | 8.98 KB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/04_software-firewalls-in-linux.en.txt | 5.02 KB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/04_software-firewalls-in-linux.mp4 | 16.77 MB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/05_services-within-linux.en.srt | 10.74 KB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/05_services-within-linux.en.txt | 6.03 KB |
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/05_services-within-linux.mp4 | 16.18 MB |
linux-server-management-security/Readme.txt | 51 B |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/01_introduction.en.srt | 4.27 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/01_introduction.en.txt | 2.59 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/01_introduction.mp4 | 17.40 MB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/04_about-the-instructor.en.srt | 10.78 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/04_about-the-instructor.en.txt | 6.24 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/04_about-the-instructor.mp4 | 155.29 MB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/01_security-at-the-forefront.en.srt | 10.20 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/01_security-at-the-forefront.en.txt | 6.24 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/01_security-at-the-forefront.mp4 | 41.89 MB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/02_attack-surfaces.en.srt | 9.27 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/02_attack-surfaces.en.txt | 5.58 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/02_attack-surfaces.mp4 | 41.88 MB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/03_integrity.en.srt | 7.40 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/03_integrity.en.txt | 4.32 KB |
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/03_integrity.mp4 | 29.52 MB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/01_policies-part-1-organizational-policies.en.srt | 9.46 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/01_policies-part-1-organizational-policies.en.txt | 5.77 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/01_policies-part-1-organizational-policies.mp4 | 40.36 MB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/03_policies-part-2-technical-policies.en.srt | 6.20 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/03_policies-part-2-technical-policies.en.txt | 3.82 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/03_policies-part-2-technical-policies.mp4 | 29.33 MB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/05_separation-of-duties.en.srt | 8.24 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/05_separation-of-duties.en.txt | 5.06 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/05_separation-of-duties.mp4 | 36.81 MB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/06_planning-for-disaster.en.srt | 10.08 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/06_planning-for-disaster.en.txt | 5.81 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/06_planning-for-disaster.mp4 | 41.18 MB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/07_if-you-build-it-they-will-get-around-it.en.srt | 10.41 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/07_if-you-build-it-they-will-get-around-it.en.txt | 6.11 KB |
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/07_if-you-build-it-they-will-get-around-it.mp4 | 41.96 MB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/01_strategies-for-monitoring.en.srt | 8.48 KB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/01_strategies-for-monitoring.en.txt | 5.03 KB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/01_strategies-for-monitoring.mp4 | 37.50 MB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/02_splunk.en.srt | 6.23 KB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/02_splunk.en.txt | 3.78 KB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/02_splunk.mp4 | 9.27 MB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/04_auditing.en.srt | 12.73 KB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/04_auditing.en.txt | 7.54 KB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/04_auditing.mp4 | 21.66 MB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/07_syslog.en.srt | 12.30 KB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/07_syslog.en.txt | 7.45 KB |
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/07_syslog.mp4 | 21.09 MB |
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/01_updating-systems-in-the-enterprise.en.srt | 7.98 KB |
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/01_updating-systems-in-the-enterprise.en.txt | 4.91 KB |
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/01_updating-systems-in-the-enterprise.mp4 | 35.57 MB |
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/02_when-something-goes-wrong.en.srt | 8.49 KB |
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/02_when-something-goes-wrong.en.txt | 4.94 KB |
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/02_when-something-goes-wrong.mp4 | 37.64 MB |
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/03_baselining-and-assessment.en.srt | 6.77 KB |
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/03_baselining-and-assessment.en.txt | 4.26 KB |
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/03_baselining-and-assessment.mp4 | 31.98 MB |
planning-auditing-maintaining-enterprise-systems/05_organizational-policies-project/01_final-video/01_congratulations.en.srt | 1.86 KB |
planning-auditing-maintaining-enterprise-systems/05_organizational-policies-project/01_final-video/01_congratulations.en.txt | 1.17 KB |
planning-auditing-maintaining-enterprise-systems/05_organizational-policies-project/01_final-video/01_congratulations.mp4 | 9.17 MB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/01_welcome.en.srt | 4.99 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/01_welcome.en.txt | 3.04 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/01_welcome.mp4 | 24.38 MB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/04_about-the-instructor.en.srt | 10.56 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/04_about-the-instructor.en.txt | 6.19 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/04_about-the-instructor.mp4 | 155.29 MB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/02_windows-in-the-enterprise.en.srt | 7.05 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/02_windows-in-the-enterprise.en.txt | 4.20 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/02_windows-in-the-enterprise.mp4 | 29.93 MB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/03_windows-server-install.en.srt | 6.22 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/03_windows-server-install.en.txt | 3.83 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/03_windows-server-install.mp4 | 8.02 MB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/05_networking-in-windows.en.srt | 10.75 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/05_networking-in-windows.en.txt | 6.52 KB |
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/05_networking-in-windows.mp4 | 15.06 MB |
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/01_windows-logon-process.en.srt | 5.70 KB |
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/01_windows-logon-process.en.txt | 3.65 KB |
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/01_windows-logon-process.mp4 | 9.02 MB |
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/04_active-directory.en.srt | 16.42 KB |
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/04_active-directory.en.txt | 9.65 KB |
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/04_active-directory.mp4 | 24.28 MB |
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/05_group-policy.en.srt | 8.30 KB |
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/05_group-policy.en.txt | 4.99 KB |
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/05_group-policy.mp4 | 12.19 MB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/01_what-is-authorization.en.srt | 7.71 KB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/01_what-is-authorization.en.txt | 4.70 KB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/01_what-is-authorization.mp4 | 39.49 MB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/02_rights-and-permissions.en.srt | 7.16 KB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/02_rights-and-permissions.en.txt | 4.34 KB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/02_rights-and-permissions.mp4 | 11.03 MB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/03_access-control.en.srt | 6.04 KB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/03_access-control.en.txt | 3.62 KB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/03_access-control.mp4 | 10.07 MB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/04_managing-users-on-an-enterprise-level.en.srt | 7.01 KB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/04_managing-users-on-an-enterprise-level.en.txt | 4.10 KB |
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/04_managing-users-on-an-enterprise-level.mp4 | 11.25 MB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/01_built-in-security-controls.en.srt | 9.13 KB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/01_built-in-security-controls.en.txt | 5.55 KB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/01_built-in-security-controls.mp4 | 40.21 MB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/03_restricting-access-to-software-and-resources.en.srt | 10.28 KB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/03_restricting-access-to-software-and-resources.en.txt | 6.22 KB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/03_restricting-access-to-software-and-resources.mp4 | 18.78 MB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/05_security-considerations-for-windows-systems.en.srt | 8.96 KB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/05_security-considerations-for-windows-systems.en.txt | 5.37 KB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/05_security-considerations-for-windows-systems.mp4 | 38.92 MB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/06_windows-and-encryption.en.srt | 6.36 KB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/06_windows-and-encryption.en.txt | 3.92 KB |
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/06_windows-and-encryption.mp4 | 9.65 MB |
udp://tracker.leechers-paradise.org:6969/announce |
udp://tracker.coppersurfer.tk:6969/announce |
udp://tracker.opentrackr.org:1337/announce |
udp://tracker.zer0day.to:1337/announce |
udp://eddie4.nl:6969/announce |
udp://tracker.tiny-vps.com:6969/announce |
udp://fasttracker.foreverpirates.co:6969/announce |
udp://tracker.opentrackr.org:1337/announce |
udp://explodie.org:6969/announce |
udp://open.stealth.si:80/announce |
udp://tracker.cyberia.is:6969/announce |
udp://ipv4.tracker.harry.lu:80/announce |
udp://tracker.uw0.xyz:6969/announce |
udp://tracker.dler.org:6969/announce |
udp://tracker.opentrackr.org:1337/announce |
http://tracker.openbittorrent.com:80/announce |
udp://opentracker.i2p.rocks:6969/announce |
udp://tracker.internetwarriors.net:1337/announce |
udp://tracker.leechers-paradise.org:6969/announce |
udp://coppersurfer.tk:6969/announce |
udp://tracker.zer0day.to:1337/announce |
TorrentBank
Copyright © 2024