Create Tool:
Create Time:1970-01-01 08:00:00
File Size:2.42 GB
File Count:99
File Hash:b97d099e6c132d19a47cf7e72840cac6c3ddd6dc
2_-_Security_Policies/12_-_STRIDE_-_Spoofing_identity.mp4 | 27.19 MB |
2_-_Security_Policies/8_-_Why_are_security_solutions_fallible.mp4 | 26.83 MB |
2_-_Security_Policies/7_-_Security_issues.mp4 | 24.97 MB |
2_-_Security_Policies/13_-_STRIDE_-_Tampering_with_Data.mp4 | 24.95 MB |
2_-_Security_Policies/10_-_Introduction_to_threat_modelling_and_classification.mp4 | 23.58 MB |
2_-_Security_Policies/9_-_Security_policy_issues.mp4 | 23.28 MB |
2_-_Security_Policies/5_-_Information_security.mp4 | 20.96 MB |
2_-_Security_Policies/6_-_Information_security_-_level_up.mp4 | 20.16 MB |
2_-_Security_Policies/4_-_What_is_security.mp4 | 19.95 MB |
2_-_Security_Policies/14_-_STRIDE_-_Denial_of_Service.mp4 | 19.27 MB |
2_-_Security_Policies/11_-_Threat_modelling_-_STRIDE.mp4 | 17.05 MB |
2_-_Security_Policies/3_-_Security_policies_-_introduction.mp4 | 10.81 MB |
3_-_Risk_Managment/31_-_Manipulation_tactics.mp4 | 46.20 MB |
3_-_Risk_Managment/35_-_Fraud_tools_1.mp4 | 37.46 MB |
3_-_Risk_Managment/19_-_Attack_Methods.mp4 | 34.92 MB |
3_-_Risk_Managment/36_-_Fraud_tools_2.mp4 | 33.54 MB |
3_-_Risk_Managment/21_-_Target_scanning_and_enumeration_techniques_1.mp4 | 31.74 MB |
3_-_Risk_Managment/28_-_EXERCISE_-_Risk_Assessment.mp4 | 30.08 MB |
3_-_Risk_Managment/25_-_Introduction_to_risk_assessment.mp4 | 29.47 MB |
3_-_Risk_Managment/32_-_EXERCISE_-_Engineering_attacks.mp4 | 25.18 MB |
3_-_Risk_Managment/33_-_SE_with_BackTrack.mp4 | 24.27 MB |
3_-_Risk_Managment/27_-_DREAD_-_Exploitability.mp4 | 24.19 MB |
3_-_Risk_Managment/26_-_DREAD_-_Risk_assessment_model.mp4 | 24.01 MB |
3_-_Risk_Managment/30_-_Introduction_to_Social_Engineering_and_rogue_software.mp4 | 23.98 MB |
3_-_Risk_Managment/20_-_Local_attacks.mp4 | 15.11 MB |
3_-_Risk_Managment/22_-_Target_scanning_and_enumeration_techniques_2.mp4 | 14.18 MB |
3_-_Risk_Managment/23_-_Passive_scanning.mp4 | 12.40 MB |
3_-_Risk_Managment/34_-_Rogue_Software.mp4 | 12.33 MB |
3_-_Risk_Managment/18_-_Introduction_to_Risk_Management.mp4 | 8.36 MB |
4_-_Defence_in_Depth/44_-_DiD_-_OS_and_LAN_layers.mp4 | 31.98 MB |
4_-_Defence_in_Depth/47_-_Automated_attack_targeting_a_service.mp4 | 28.84 MB |
4_-_Defence_in_Depth/60_-_Laws_for_administrators.mp4 | 28.16 MB |
4_-_Defence_in_Depth/43_-_How_to_use_Defence_in_depth_model.mp4 | 27.65 MB |
4_-_Defence_in_Depth/50_-_Introduction_to_Immutable_laws_of_security_-_Law_1.mp4 | 25.64 MB |
4_-_Defence_in_Depth/48_-_Automated_user-targeting_attack.mp4 | 25.28 MB |
4_-_Defence_in_Depth/58_-_Law_9.mp4 | 17.99 MB |
4_-_Defence_in_Depth/54_-_Law_5.mp4 | 16.64 MB |
4_-_Defence_in_Depth/45_-_DiD_-_Perimeter_and_Physical_Access_Layers.mp4 | 16.48 MB |
4_-_Defence_in_Depth/51_-_Law_2.mp4 | 11.83 MB |
4_-_Defence_in_Depth/52_-_Law_3.mp4 | 11.64 MB |
4_-_Defence_in_Depth/53_-_Law_4.mp4 | 11.48 MB |
4_-_Defence_in_Depth/55_-_Law_6.mp4 | 11.42 MB |
4_-_Defence_in_Depth/46_-_DiD_-_Demonstration.mp4 | 8.77 MB |
4_-_Defence_in_Depth/57_-_Law_8.mp4 | 8.56 MB |
4_-_Defence_in_Depth/42_-_Introduction_to_Defence_in_depth.mp4 | 8.55 MB |
4_-_Defence_in_Depth/56_-_Law_7.mp4 | 5.91 MB |
4_-_Defence_in_Depth/59_-_Law_10.mp4 | 3.60 MB |
5_-_Disaster_Recovery/74_-_CONFICKER_-_CASE_STUDY.mp4 | 39.02 MB |
5_-_Disaster_Recovery/72_-_Collecting_and_analysing_evidence.mp4 | 29.07 MB |
5_-_Disaster_Recovery/66_-_How_to_reduce_losses.mp4 | 28.85 MB |
5_-_Disaster_Recovery/70_-_Audit_users_and_keep_control_accounts.mp4 | 25.13 MB |
5_-_Disaster_Recovery/68_-_Threat_discovery_1.mp4 | 22.52 MB |
5_-_Disaster_Recovery/67_-_Ensuring_continous_availability.mp4 | 21.46 MB |
5_-_Disaster_Recovery/73_-_Forensics_example.mp4 | 19.42 MB |
5_-_Disaster_Recovery/69_-_Threat_discovery_2.mp4 | 16.25 MB |
5_-_Disaster_Recovery/71_-_High_risk_users.mp4 | 14.92 MB |
5_-_Disaster_Recovery/65_-_Introduction_to_Disaster_Recovery.mp4 | 10.10 MB |
6_-_Application_Security/84_-_Cross-site_scripting_-_XSS.mp4 | 51.63 MB |
6_-_Application_Security/87_-_Unsafe_applications.mp4 | 49.41 MB |
6_-_Application_Security/79_-_Attacks_on_applications.mp4 | 48.64 MB |
6_-_Application_Security/83_-_Automated_SQL_Injection.mp4 | 45.53 MB |
6_-_Application_Security/82_-_Blind_SQL_Injection.mp4 | 43.20 MB |
6_-_Application_Security/78_-_Introduction_to_Application_Security.mp4 | 40.85 MB |
6_-_Application_Security/81_-_EXERCISE_-_Analyze_the_application.mp4 | 34.13 MB |
6_-_Application_Security/80_-_SQL_Injection.mp4 | 28.50 MB |
6_-_Application_Security/86_-_Program_security_assessment.mp4 | 24.05 MB |
7_-_Application_Security_-_Configuration_and_Managment/97_-_Blocking_applications.mp4 | 34.42 MB |
7_-_Application_Security_-_Configuration_and_Managment/95_-_MS_Update.mp4 | 31.16 MB |
7_-_Application_Security_-_Configuration_and_Managment/99_-_EXERCISE_-_Application_control_rules.mp4 | 30.73 MB |
7_-_Application_Security_-_Configuration_and_Managment/100_-_Isolating_applications.mp4 | 29.92 MB |
7_-_Application_Security_-_Configuration_and_Managment/98_-_Software_restrictions_policies.mp4 | 27.58 MB |
7_-_Application_Security_-_Configuration_and_Managment/93_-_Managing_applicaltions.mp4 | 23.63 MB |
7_-_Application_Security_-_Configuration_and_Managment/94_-_Software_updates.mp4 | 12.38 MB |
7_-_Application_Security_-_Configuration_and_Managment/96_-_System_Center_Configuration_Manager.mp4 | 11.96 MB |
7_-_Application_Security_-_Configuration_and_Managment/92_-_Here_s_what_you_ll_learn_in_this_module.mp4 | 5.47 MB |
8_-_Cryptography/104_-_Introduction_to_cryptography.mp4 | 48.51 MB |
8_-_Cryptography/105_-_History_of_ciphers.mp4 | 48.03 MB |
8_-_Cryptography/114_-_Asymmetric-key_algorithms.mp4 | 37.10 MB |
8_-_Cryptography/110_-_DES-X.mp4 | 33.53 MB |
8_-_Cryptography/112_-_Block_cipher_modes.mp4 | 31.56 MB |
8_-_Cryptography/119_-_Hybrid_Schemes.mp4 | 31.32 MB |
8_-_Cryptography/109_-_Data_encryption_standard.mp4 | 31.06 MB |
8_-_Cryptography/118_-_Digital_signature.mp4 | 29.32 MB |
8_-_Cryptography/108_-_Block_ciphers.mp4 | 27.69 MB |
8_-_Cryptography/117_-_HASH_functions.mp4 | 27.33 MB |
8_-_Cryptography/106_-_Symmetric_and_asymmetric_ciphers.mp4 | 25.95 MB |
8_-_Cryptography/107_-_Symmetric-key_algorithms.mp4 | 25.30 MB |
8_-_Cryptography/115_-_RSA.mp4 | 24.51 MB |
8_-_Cryptography/111_-_Advanced_encryption_standards.mp4 | 23.34 MB |
8_-_Cryptography/113_-_Stream_Ciphers_-_RC4.mp4 | 16.36 MB |
8_-_Cryptography/116_-_ELGAMAL.mp4 | 9.13 MB |
9_-_Public_Key_Infrastructure/129_-_Planning_the_PKI.mp4 | 41.92 MB |
9_-_Public_Key_Infrastructure/130_-_PKI_Administration.mp4 | 37.23 MB |
9_-_Public_Key_Infrastructure/128_-_Certificate_life_cycle.mp4 | 29.56 MB |
9_-_Public_Key_Infrastructure/124_-_Public_key_infrastructure.mp4 | 29.12 MB |
9_-_Public_Key_Infrastructure/127_-_EXERCISE_-_Certificates.mp4 | 28.16 MB |
9_-_Public_Key_Infrastructure/125_-_Implementing_public_key_infrastructure.mp4 | 24.28 MB |
9_-_Public_Key_Infrastructure/126_-_What_will_PKI_allow_you.mp4 | 23.43 MB |
9_-_Public_Key_Infrastructure/123_-_Introduction_to_cryptology.mp4 | 10.95 MB |
udp://tracker.publicbt.com/announce |
udp://open.demonii.com:1337 |
TorrentBank
Copyright © 2024