Create Tool:
Create Time:1970-01-01 08:00:00
File Size:4.37 GB
File Count:90
File Hash:c62b089215e5a6a85b1126bf48a12661305a458e
001 Welcome to Security+.mp4 | 25.54 MB |
002 Infrastructure Security Devices.mp4 | 89.00 MB |
003 Application and Traffic Analysis .mp4 | 38.66 MB |
004 Network Segmentation and Separation with VLANs.mp4 | 51.92 MB |
005 ACL Case Study.mp4 | 59.91 MB |
006 Design Considerations.mp4 | 75.33 MB |
007 NAT and PAT Case Study.mp4 | 45.73 MB |
008 Firewall and Switch Protection Mechanisms.mp4 | 57.96 MB |
009 Virtualization Overview.mp4 | 52.68 MB |
010 IPsec_ Protocols_ and Well-known Ports.mp4 | 68.28 MB |
011 ICMP and a Few More Protocols.mp4 | 60.39 MB |
012 Security for WiFi.mp4 | 94.98 MB |
013 Risk Overview.mp4 | 92.54 MB |
014 Risk Calculation.mp4 | 68.94 MB |
015 Attack Vectors_ Risk Management_ and Recovery.mp4 | 41.97 MB |
016 Third-Party Risk from Integration.mp4 | 39.89 MB |
017 Change Management and Account Auditing.mp4 | 59.04 MB |
018 Data Loss Prevention (DLP).mp4 | 40.92 MB |
019 Forensics.mp4 | 73.11 MB |
020 Incident Response Concepts.mp4 | 43.50 MB |
021 Security Awareness_ RBAC_ and Data Labeling .mp4 | 54.39 MB |
022 Passwords_ Best Practices_ and Standards.mp4 | 54.34 MB |
023 Environmental Controls.mp4 | 39.83 MB |
024 Physical Security.mp4 | 48.01 MB |
025 Business Continuity.mp4 | 65.06 MB |
026 Fault Tolerance.mp4 | 67.18 MB |
027 Controls for Confidentiality .mp4 | 50.04 MB |
028 Tools and Controls for Data Integrity.mp4 | 68.77 MB |
029 Availability and Safety.mp4 | 20.93 MB |
030 Malware_ Adware - Spyware.mp4 | 43.25 MB |
031 Trojans_ Backdoors_ and More Malware.mp4 | 68.76 MB |
032 Attack Types MITM - Spear Fishing.mp4 | 72.17 MB |
033 Attack Types_ Xmas - Client Side.mp4 | 55.05 MB |
034 Password Attacks and Watering Holes.mp4 | 51.00 MB |
035 Social Engineering Threats.mp4 | 48.85 MB |
036 Vishing and Why Social Engineering Works.mp4 | 43.11 MB |
037 Wireless Attacks.mp4 | 55.83 MB |
038 Cross-site and Injection Attacks.mp4 | 64.64 MB |
039 Application Attacks.mp4 | 46.84 MB |
040 Monitoring and Device Hardening.mp4 | 70.63 MB |
041 Baselines_ Detection_ and Reporting.mp4 | 38.70 MB |
042 Analyzers and Scanners.mp4 | 75.25 MB |
043 Discovering and Assessing Threats.mp4 | 58.08 MB |
044 Penetration Testing.mp4 | 48.82 MB |
045 Techniques for Securing Apps.mp4 | 39.67 MB |
046 Application Security Controls.mp4 | 56.08 MB |
047 Mobile Device Security Overview.mp4 | 70.63 MB |
048 Host Security.mp4 | 43.03 MB |
049 Hardware and Virtualization Security.mp4 | 46.43 MB |
050 Data Security.mp4 | 40.12 MB |
051 Securing Data with H_W_ Controls_ and Policy.mp4 | 39.53 MB |
052 Security in Static Environments.mp4 | 54.43 MB |
053 AAA Concepts.mp4 | 36.92 MB |
054 Authentication Protocols and Services.mp4 | 68.67 MB |
055 Multifactor Authentication.mp4 | 51.23 MB |
056 Authentication Controls.mp4 | 71.70 MB |
057 Controlling Access via Authorization.mp4 | 68.90 MB |
058 Account Management.mp4 | 76.80 MB |
059 Symmetric and Asymmetric Encryption.mp4 | 69.62 MB |
060 Crypto Key Management.mp4 | 81.85 MB |
061 Hashing and Encryption Protocols.mp4 | 72.19 MB |
062 Comparing Cryptography Algorithms.mp4 | 63.03 MB |
063 PKI Overview.mp4 | 55.21 MB |
064 Certificate Warnings and Trust Models.mp4 | 37.73 MB |
065 Layered Security Case Study.mp4 | 39.20 MB |
066 Attack Types and Vectors.mp4 | 15.70 MB |
067 Threat Actor Types and Ethics.mp4 | 20.18 MB |
068 Reconnaissance Information Gathering Concepts.mp4 | 36.56 MB |
069 Hacking Vocabulary and Terms.mp4 | 22.36 MB |
070 Malware Concepts.mp4 | 33.96 MB |
071 Network Scanning Overview.mp4 | 13.71 MB |
072 Trojans.mp4 | 37.27 MB |
073 Port Security.mp4 | 38.77 MB |
074 Scanning Methodologies.mp4 | 32.68 MB |
075 Sniffing Overview.mp4 | 43.48 MB |
076 Vulnerability Scanning.mp4 | 29.48 MB |
077 Social Engineering Overview.mp4 | 50.85 MB |
078 System Hacking Stages and Goals.mp4 | 34.21 MB |
079 Buffer Overflow.mp4 | 48.36 MB |
080 OWASP BWAP.mp4 | 36.16 MB |
081 Honeypots and Honeynets.mp4 | 41.26 MB |
082 Centralized Identity Management.mp4 | 49.79 MB |
083 SSO_ Kerberos_ and Security Threats.mp4 | 63.84 MB |
084 Incident Response.mp4 | 44.24 MB |
085 Penetration Testing Legally.mp4 | 37.51 MB |
086 Case Study #1.mp4 | 75.92 MB |
[CourseClub.NET].txt | 1.17 KB |
[CourseClub.NET].url | 123 B |
[FreeCourseSite.com].txt | 1.07 KB |
[FreeCourseSite.com].url | 127 B |
udp://62.138.0.158:6969/announce;tr=udp://151.80.120.113:2710/announce;tr=udp://210.244.71.25:6969/announce;tr=udp://87.233.192.220:6969/announce;tr=udp://191.96.249.23:6969/announce;tr=udp://37.19.5.139:6969/announce;tr=udp://92.241.171.245:6969/announce;tr=udp://173.254.219.72:6969/announce;tr=udp://51.15.4.13:1337/announce;tr=udp://123.249.16.65:2710/announce;tr=udp://78.142.19.42:1337/announce;tr=udp://90.179.64.91:1337/announce;tr=udp://35.187.36.248:1337/announce;tr=udp://127.0.0.1:6969/announce;tr=udp://51.15.76.199:6969/announce;tr=udp://91.212.150.191:3418/announce;tr=udp://111.6.78.96:6969/announce;tr=udp://88.198.231.1:1337/announce;tr=udp://103.224.212.222:6969/announce;tr=udp://51.15.40.114:80/announce |
TorrentBank
Copyright © 2024