[FreeAllCourse.Com] Udemy - TOTAL CompTIA Security+ Certification (SY0-501) - TorrentBank

File Name:[FreeAllCourse.Com] Udemy - TOTAL CompTIA Security+ Certification (SY0-501)

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:20.80 GB

File Count:255

File Hash:a1b4ce9284330003c9f86cf14d31db4fc6f9254c

Magnet Link:

Magnet Link:

Torrent File:

1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.mp4 75.28 MB
1. Risk Management/1. Introduction to the CompTIA Security+ Exam SY0-501.srt 5.25 KB
1. Risk Management/1.1 CompTIA Security (SY0-501).pdf.pdf 540.61 KB
1. Risk Management/10. IT Security Governance.mp4 139.40 MB
1. Risk Management/10. IT Security Governance.srt 12.25 KB
1. Risk Management/11. Security Policies.mp4 174.00 MB
1. Risk Management/11. Security Policies.srt 12.26 KB
1. Risk Management/12. Frameworks.mp4 170.87 MB
1. Risk Management/12. Frameworks.srt 12.90 KB
1. Risk Management/13. Quantitative Risk Calculations.mp4 94.82 MB
1. Risk Management/13. Quantitative Risk Calculations.srt 11.53 KB
1. Risk Management/14. Business Impact Analysis.mp4 220.29 MB
1. Risk Management/14. Business Impact Analysis.srt 17.44 KB
1. Risk Management/15. Organizing Data.mp4 217.67 MB
1. Risk Management/15. Organizing Data.srt 14.20 KB
1. Risk Management/16. Security Training.mp4 116.29 MB
1. Risk Management/16. Security Training.srt 14.22 KB
1. Risk Management/17. Third Party Agreements.mp4 103.64 MB
1. Risk Management/17. Third Party Agreements.srt 11.50 KB
1. Risk Management/18. Risk Management Quiz.html 166 B
1. Risk Management/2. The CIA of Security.mp4 43.93 MB
1. Risk Management/2. The CIA of Security.srt 5.03 KB
1. Risk Management/3. What is Risk.mp4 213.85 MB
1. Risk Management/3. What is Risk.srt 15.11 KB
1. Risk Management/4. Threat Actors.mp4 142.12 MB
1. Risk Management/4. Threat Actors.srt 10.01 KB
1. Risk Management/5. Managing Risk.mp4 255.51 MB
1. Risk Management/5. Managing Risk.srt 17.94 KB
1. Risk Management/6. Using Guides for Risk Assessment.mp4 114.52 MB
1. Risk Management/6. Using Guides for Risk Assessment.srt 9.44 KB
1. Risk Management/7. Security Controls.mp4 96.83 MB
1. Risk Management/7. Security Controls.srt 10.90 KB
1. Risk Management/8. Interesting Security Controls.mp4 30.96 MB
1. Risk Management/8. Interesting Security Controls.srt 4.68 KB
1. Risk Management/9. Defense in Depth.mp4 97.93 MB
1. Risk Management/9. Defense in Depth.srt 7.25 KB
10. Dealing with Incidents/1. Incident Response.mp4 48.33 MB
10. Dealing with Incidents/1. Incident Response.srt 8.97 KB
10. Dealing with Incidents/2. Digital Forensics.mp4 167.91 MB
10. Dealing with Incidents/2. Digital Forensics.srt 16.60 KB
10. Dealing with Incidents/3. Contingency Planning.mp4 165.09 MB
10. Dealing with Incidents/3. Contingency Planning.srt 15.87 KB
10. Dealing with Incidents/4. Backups.mp4 91.13 MB
10. Dealing with Incidents/4. Backups.srt 11.46 KB
10. Dealing with Incidents/5. Dealing with Incidents Quiz.html 166 B
2. Cryptography/1. Cryptography Basics.mp4 260.18 MB
2. Cryptography/1. Cryptography Basics.srt 24.10 KB
2. Cryptography/10. Steganography.mp4 78.59 MB
2. Cryptography/10. Steganography.srt 8.26 KB
2. Cryptography/11. Certificates and Trust.mp4 278.63 MB
2. Cryptography/11. Certificates and Trust.srt 21.09 KB
2. Cryptography/12. Public Key Infrastructure.mp4 320.19 MB
2. Cryptography/12. Public Key Infrastructure.srt 32.81 KB
2. Cryptography/13. Cryptographic Attacks.mp4 416.56 MB
2. Cryptography/13. Cryptographic Attacks.srt 36.05 KB
2. Cryptography/14. Cryptography Quiz.html 166 B
2. Cryptography/2. Cryptographic Methods.mp4 160.57 MB
2. Cryptography/2. Cryptographic Methods.srt 10.04 KB
2. Cryptography/3. Symmetric Cryptosystems.mp4 193.38 MB
2. Cryptography/3. Symmetric Cryptosystems.srt 193.40 MB
2. Cryptography/4. Symmetric Block Modes.mp4 114.29 MB
2. Cryptography/4. Symmetric Block Modes.srt 11.04 KB
2. Cryptography/5. RSA Cryptosystems.mp4 193.89 MB
2. Cryptography/5. RSA Cryptosystems.srt 14.47 KB
2. Cryptography/6. Diffie-Hellman.mp4 97.29 MB
2. Cryptography/6. Diffie-Hellman.srt 8.95 KB
2. Cryptography/7. PGPGPG.mp4 188.42 MB
2. Cryptography/7. PGPGPG.srt 13.53 KB
2. Cryptography/8. Hashing.mp4 106.49 MB
2. Cryptography/8. Hashing.srt 9.99 KB
2. Cryptography/9. HMAC.mp4 65.55 MB
2. Cryptography/9. HMAC.srt 4.95 KB
3. Identity and Access Management/1. Identification.mp4 260.87 MB
3. Identity and Access Management/1. Identification.srt 19.95 KB
3. Identity and Access Management/10. Single Sign-On.mp4 172.04 MB
3. Identity and Access Management/10. Single Sign-On.srt 15.36 KB
3. Identity and Access Management/11. Identity and Access Management Quiz.html 166 B
3. Identity and Access Management/2. Authorization Concepts.mp4 116.48 MB
3. Identity and Access Management/2. Authorization Concepts.srt 8.42 KB
3. Identity and Access Management/3. Access Control List.mp4 67.61 MB
3. Identity and Access Management/3. Access Control List.srt 9.00 KB
3. Identity and Access Management/4. Password Security.mp4 160.40 MB
3. Identity and Access Management/4. Password Security.srt 13.96 KB
3. Identity and Access Management/5. Linux File Permissions.mp4 190.84 MB
3. Identity and Access Management/5. Linux File Permissions.srt 21.69 KB
3. Identity and Access Management/6. Windows File Permissions.mp4 220.82 MB
3. Identity and Access Management/6. Windows File Permissions.srt 20.19 KB
3. Identity and Access Management/7. User Account Management.mp4 143.25 MB
3. Identity and Access Management/7. User Account Management.srt 9.80 KB
3. Identity and Access Management/8. AAA.mp4 170.75 MB
3. Identity and Access Management/8. AAA.srt 12.00 KB
3. Identity and Access Management/9. Authentication Methods.mp4 206.27 MB
3. Identity and Access Management/9. Authentication Methods.srt 206.27 MB
4. Tools of the Trade/1. OS Utilities, Part 1.mp4 247.70 MB
4. Tools of the Trade/1. OS Utilities, Part 1.srt 21.36 KB
4. Tools of the Trade/2. OS Utilities, Part 2.mp4 210.60 MB
4. Tools of the Trade/2. OS Utilities, Part 2.srt 20.31 KB
4. Tools of the Trade/3. Network Scanners.mp4 164.82 MB
4. Tools of the Trade/3. Network Scanners.srt 16.22 KB
4. Tools of the Trade/4. Protocol Analyzers.mp4 185.27 MB
4. Tools of the Trade/4. Protocol Analyzers.srt 15.44 KB
4. Tools of the Trade/5. SNMP.mp4 203.51 MB
4. Tools of the Trade/5. SNMP.srt 22.10 KB
4. Tools of the Trade/6. Logs.mp4 125.72 MB
4. Tools of the Trade/6. Logs.srt 16.47 KB
4. Tools of the Trade/7. Tools of the Trade Quiz.html 166 B
5. Securing Individual Systems/1. Denial of Service.mp4 116.11 MB
5. Securing Individual Systems/1. Denial of Service.srt 12.80 KB
5. Securing Individual Systems/10. Data and System Security.mp4 76.59 MB
5. Securing Individual Systems/10. Data and System Security.srt 76.60 MB
5. Securing Individual Systems/11. Disk Encryption.mp4 133.08 MB
5. Securing Individual Systems/11. Disk Encryption.srt 9.20 KB
5. Securing Individual Systems/12. HardwareFirmware Security.mp4 189.84 MB
5. Securing Individual Systems/12. HardwareFirmware Security.srt 13.61 KB
5. Securing Individual Systems/13. Secure OS Types.mp4 167.50 MB
5. Securing Individual Systems/13. Secure OS Types.srt 10.97 KB
5. Securing Individual Systems/14. Securing Peripherals.mp4 241.78 MB
5. Securing Individual Systems/14. Securing Peripherals.srt 16.57 KB
5. Securing Individual Systems/15. Malware.mp4 214.64 MB
5. Securing Individual Systems/15. Malware.srt 14.35 KB
5. Securing Individual Systems/16. Analyzing Output.mp4 297.73 MB
5. Securing Individual Systems/16. Analyzing Output.srt 22.55 KB
5. Securing Individual Systems/17. IDS and IPS.mp4 94.64 MB
5. Securing Individual Systems/17. IDS and IPS.srt 6.04 KB
5. Securing Individual Systems/18. Automation Strategies.mp4 104.43 MB
5. Securing Individual Systems/18. Automation Strategies.srt 7.10 KB
5. Securing Individual Systems/19. Data Destruction.mp4 103.84 MB
5. Securing Individual Systems/19. Data Destruction.srt 6.63 KB
5. Securing Individual Systems/2. Host Threats.mp4 186.70 MB
5. Securing Individual Systems/2. Host Threats.srt 12.73 KB
5. Securing Individual Systems/20. Securing Individual Systems Quiz.html 166 B
5. Securing Individual Systems/3. Man-in-the-Middle.mp4 410.12 MB
5. Securing Individual Systems/3. Man-in-the-Middle.srt 32.68 KB
5. Securing Individual Systems/4. System Resiliency.mp4 191.02 MB
5. Securing Individual Systems/4. System Resiliency.srt 16.75 KB
5. Securing Individual Systems/5. RAID.mp4 154.52 MB
5. Securing Individual Systems/5. RAID.srt 154.55 MB
5. Securing Individual Systems/6. NAS and SAN.mp4 265.96 MB
5. Securing Individual Systems/6. NAS and SAN.srt 22.12 KB
5. Securing Individual Systems/7. Physical Hardening.mp4 138.46 MB
5. Securing Individual Systems/7. Physical Hardening.srt 10.58 KB
5. Securing Individual Systems/8. RFI, EMI and ESD.mp4 32.97 MB
5. Securing Individual Systems/8. RFI, EMI and ESD.srt 4.16 KB
5. Securing Individual Systems/9. Host Hardening.mp4 334.60 MB
5. Securing Individual Systems/9. Host Hardening.srt 24.77 KB
6. The Basic LAN/1. LAN Review.mp4 120.24 MB
6. The Basic LAN/1. LAN Review.srt 11.37 KB
6. The Basic LAN/10. NIDSNIPS.mp4 115.03 MB
6. The Basic LAN/10. NIDSNIPS.srt 8.17 KB
6. The Basic LAN/11. SIEM.mp4 139.41 MB
6. The Basic LAN/11. SIEM.srt 10.96 KB
6. The Basic LAN/12. The Basic LAN Quiz.html 166 B
6. The Basic LAN/2. Network Topologies Review.mp4 62.18 MB
6. The Basic LAN/2. Network Topologies Review.srt 6.79 KB
6. The Basic LAN/3. Network Zone Review.mp4 124.63 MB
6. The Basic LAN/3. Network Zone Review.srt 124.65 MB
6. The Basic LAN/4. Network Access Controls.mp4 159.43 MB
6. The Basic LAN/4. Network Access Controls.srt 14.65 KB
6. The Basic LAN/5. The Network Firewall.mp4 190.86 MB
6. The Basic LAN/5. The Network Firewall.srt 18.81 KB
6. The Basic LAN/6. Proxy Servers.mp4 211.77 MB
6. The Basic LAN/6. Proxy Servers.srt 17.71 KB
6. The Basic LAN/7. Honeypots.mp4 81.32 MB
6. The Basic LAN/7. Honeypots.srt 6.11 KB
6. The Basic LAN/8. Virtual Private Networks.mp4 179.46 MB
6. The Basic LAN/8. Virtual Private Networks.srt 19.72 KB
6. The Basic LAN/9. IPSec.mp4 210.05 MB
6. The Basic LAN/9. IPSec.srt 16.42 KB
7. Beyond the Basic LAN/1. Wireless Review.mp4 172.69 MB
7. Beyond the Basic LAN/1. Wireless Review.srt 12.57 KB
7. Beyond the Basic LAN/10. Virtual Security.mp4 254.76 MB
7. Beyond the Basic LAN/10. Virtual Security.srt 22.54 KB
7. Beyond the Basic LAN/11. Containers.mp4 176.51 MB
7. Beyond the Basic LAN/11. Containers.srt 17.23 KB
7. Beyond the Basic LAN/12. IaaS.mp4 149.17 MB
7. Beyond the Basic LAN/12. IaaS.srt 13.84 KB
7. Beyond the Basic LAN/13. PaaS.mp4 133.48 MB
7. Beyond the Basic LAN/13. PaaS.srt 132.19 MB
7. Beyond the Basic LAN/14. SaaS.mp4 54.06 MB
7. Beyond the Basic LAN/14. SaaS.srt 3.61 KB
7. Beyond the Basic LAN/15. Deployment Models.mp4 141.39 MB
7. Beyond the Basic LAN/15. Deployment Models.srt 20.12 MB
7. Beyond the Basic LAN/16. Static Hosts.mp4 141.81 MB
7. Beyond the Basic LAN/16. Static Hosts.srt 141.84 MB
7. Beyond the Basic LAN/17. Mobile Connectivity.mp4 256.07 MB
7. Beyond the Basic LAN/17. Mobile Connectivity.srt 16.35 KB
7. Beyond the Basic LAN/18. Deploying Mobile Devices.mp4 78.93 MB
7. Beyond the Basic LAN/18. Deploying Mobile Devices.srt 7.36 KB
7. Beyond the Basic LAN/19. Mobile Enforcement.mp4 265.52 MB
7. Beyond the Basic LAN/19. Mobile Enforcement.srt 18.42 KB
7. Beyond the Basic LAN/2. Living in Open Networks.mp4 175.38 MB
7. Beyond the Basic LAN/2. Living in Open Networks.srt 14.07 KB
7. Beyond the Basic LAN/20. Mobile Device Management.mp4 125.04 MB
7. Beyond the Basic LAN/20. Mobile Device Management.srt 14.75 KB
7. Beyond the Basic LAN/21. Physical Controls.mp4 176.09 MB
7. Beyond the Basic LAN/21. Physical Controls.srt 12.45 KB
7. Beyond the Basic LAN/22. HVAC.mp4 135.35 MB
7. Beyond the Basic LAN/22. HVAC.srt 10.30 KB
7. Beyond the Basic LAN/23. Fire Suppression.mp4 72.57 MB
7. Beyond the Basic LAN/23. Fire Suppression.srt 5.68 KB
7. Beyond the Basic LAN/24. Beyond the Basic LAN Quiz.html 166 B
7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.mp4 135.76 MB
7. Beyond the Basic LAN/3. Vulnerabilities with Wireless Access Points.srt 10.10 KB
7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.mp4 217.01 MB
7. Beyond the Basic LAN/4. Cracking 802.11 – WEP.srt 15.17 KB
7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.mp4 185.74 MB
7. Beyond the Basic LAN/5. Cracking 802.11 – WPA.srt 11.24 KB
7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.mp4 196.32 MB
7. Beyond the Basic LAN/6. Cracking 802.11 – WPS.srt 13.93 KB
7. Beyond the Basic LAN/7. Wireless Hardening.mp4 272.51 MB
7. Beyond the Basic LAN/7. Wireless Hardening.srt 272.54 MB
7. Beyond the Basic LAN/8. Wireless Access Points.mp4 277.12 MB
7. Beyond the Basic LAN/8. Wireless Access Points.srt 18.64 KB
7. Beyond the Basic LAN/9. Virtualization Basics.mp4 139.29 MB
7. Beyond the Basic LAN/9. Virtualization Basics.srt 10.96 KB
8. Secure Protocols/1. Secure Applications and Protocols.mp4 191.52 MB
8. Secure Protocols/1. Secure Applications and Protocols.srt 191.56 MB
8. Secure Protocols/10. Code Quality and Testing.mp4 102.99 MB
8. Secure Protocols/10. Code Quality and Testing.srt 7.34 KB
8. Secure Protocols/11. Secure Protocols Quiz.html 166 B
8. Secure Protocols/2. Network Models.mp4 147.97 MB
8. Secure Protocols/2. Network Models.srt 10.60 KB
8. Secure Protocols/3. Know Your Protocols - TCPIP.mp4 131.84 MB
8. Secure Protocols/3. Know Your Protocols - TCPIP.srt 8.38 KB
8. Secure Protocols/4. Know Your Protocols - Applications.mp4 48.83 MB
8. Secure Protocols/4. Know Your Protocols - Applications.srt 7.45 KB
8. Secure Protocols/5. Transport Layer Security (TLS).mp4 195.77 MB
8. Secure Protocols/5. Transport Layer Security (TLS).srt 195.77 MB
8. Secure Protocols/6. Internet Service Hardening.mp4 79.02 MB
8. Secure Protocols/6. Internet Service Hardening.srt 9.01 KB
8. Secure Protocols/7. Protecting Your Servers.mp4 86.62 MB
8. Secure Protocols/7. Protecting Your Servers.srt 8.62 KB
8. Secure Protocols/8. Secure Code Development.mp4 182.37 MB
8. Secure Protocols/8. Secure Code Development.srt 15.36 KB
8. Secure Protocols/9. Secure Deployment Concepts.mp4 223.45 MB
8. Secure Protocols/9. Secure Deployment Concepts.srt 16.89 KB
9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.mp4 159.57 MB
9. Testing Your Infrastructure/1. Vulnerability Scanning Tools.srt 13.51 KB
9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.mp4 100.51 MB
9. Testing Your Infrastructure/2. Vulnerability Scanning Assessment.srt 6.85 KB
9. Testing Your Infrastructure/3. Social Engineering Principles.mp4 39.68 MB
9. Testing Your Infrastructure/3. Social Engineering Principles.srt 2.82 KB
9. Testing Your Infrastructure/4. Social Engineering Attacks.mp4 131.61 MB
9. Testing Your Infrastructure/4. Social Engineering Attacks.srt 11.09 KB
9. Testing Your Infrastructure/5. Attacking Web Sites.mp4 91.15 MB
9. Testing Your Infrastructure/5. Attacking Web Sites.srt 11.54 KB
9. Testing Your Infrastructure/6. Attacking Applications.mp4 181.96 MB
9. Testing Your Infrastructure/6. Attacking Applications.srt 15.20 KB
9. Testing Your Infrastructure/7. Exploiting a Target.mp4 168.36 MB
9. Testing Your Infrastructure/7. Exploiting a Target.srt 15.43 KB
9. Testing Your Infrastructure/8. Vulnerability Impact.mp4 237.32 MB
9. Testing Your Infrastructure/8. Vulnerability Impact.srt 15.58 KB
9. Testing Your Infrastructure/9. Testing Your Infrastructure Quiz.html 166 B
Read Me.txt 1.01 KB
[FreeAllCourse.Com].URL 228 B
http://h4.trakx.nibba.trade:80/announce
http://tracker.files.fm:6969/announce
http://tracker.nyap2p.com:8080/announce
http://tracker3.itzmx.com:6961/announce
udp://chihaya.toss.li:9696/announce
udp://coppersurfer.tk:6969/announce
udp://explodie.org:6969/announce
udp://open.stealth.si:80/announce
udp://opentracker.i2p.rocks:6969/announce
udp://p4p.arenabg.com:1337/announce
udp://retracker.akado-ural.ru:80/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.uw0.xyz:6969/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.zerobytes.xyz:1337/announce
udp://zephir.monocul.us:6969/announce

TorrentBank
Copyright © 2024