Create Tool:qBittorrent v4.1.5
Create Time:1970-01-01 08:00:00
File Size:3.99 GB
File Count:231
File Hash:9908439a4f45c2393e1c2bcdf1e1875cd7e70a78
Get Bonus Downloads Here.url | 182 B |
~Get Your Files Here !/1 - Introduction to Security CompTIA Security Plus SY0701 Certification Prep/1 - Introduction to security.mp4 | 27.85 MB |
~Get Your Files Here !/10 - Intrusion Detection Systems/53 - Understanding IDSs and IPSs.mp4 | 36.22 MB |
~Get Your Files Here !/10 - Intrusion Detection Systems/54 - Detection Methods.mp4 | 17.21 MB |
~Get Your Files Here !/10 - Intrusion Detection Systems/55 - Honeypots.mp4 | 19.11 MB |
~Get Your Files Here !/11 - Virtual Private Network VPN Technologies/56 - Using VPNs for Remote Access.mp4 | 46.19 MB |
~Get Your Files Here !/11 - Virtual Private Network VPN Technologies/57 - VPN Tunnel Protocols.mp4 | 20.56 MB |
~Get Your Files Here !/11 - Virtual Private Network VPN Technologies/58 - SitetoSite VPNs.mp4 | 13.64 MB |
~Get Your Files Here !/12 - Security Threats/59 - Understanding Threat Actors.mp4 | 56.24 MB |
~Get Your Files Here !/12 - Security Threats/60 - Viruses.mp4 | 9.03 MB |
~Get Your Files Here !/12 - Security Threats/61 - Logic Bombs.mp4 | 9.53 MB |
~Get Your Files Here !/12 - Security Threats/62 - Trojans.mp4 | 15.98 MB |
~Get Your Files Here !/12 - Security Threats/63 - Ransomware.mp4 | 13.65 MB |
~Get Your Files Here !/12 - Security Threats/64 - Spyware.mp4 | 8.81 MB |
~Get Your Files Here !/12 - Security Threats/65 - Bots and Botnets.mp4 | 13.06 MB |
~Get Your Files Here !/12 - Security Threats/66 - Unified Threat ManagementUTM.mp4 | 23.66 MB |
~Get Your Files Here !/13 - Securing Wireless Networks/67 - Disable SSID Broadcasting or Not.mp4 | 4.16 MB |
~Get Your Files Here !/13 - Securing Wireless Networks/68 - Enable MAC Filtering.mp4 | 9.09 MB |
~Get Your Files Here !/14 - Understanding Wireless Attacks/69 - Disassociation Attacks.mp4 | 8.45 MB |
~Get Your Files Here !/14 - Understanding Wireless Attacks/70 - WPS and WPS Attacks.mp4 | 7.52 MB |
~Get Your Files Here !/14 - Understanding Wireless Attacks/71 - Rogue AP.mp4 | 8.47 MB |
~Get Your Files Here !/14 - Understanding Wireless Attacks/72 - Evil Twin.mp4 | 7.97 MB |
~Get Your Files Here !/14 - Understanding Wireless Attacks/73 - Jamming Attacks.mp4 | 16.87 MB |
~Get Your Files Here !/14 - Understanding Wireless Attacks/74 - Bluetooth Attacks.mp4 | 9.80 MB |
~Get Your Files Here !/14 - Understanding Wireless Attacks/75 - RFID Attacks.mp4 | 8.72 MB |
~Get Your Files Here !/14 - Understanding Wireless Attacks/76 - Wireless Replay Attacks.mp4 | 5.72 MB |
~Get Your Files Here !/15 - Network Attacks/77 - Network Attacks.mp4 | 15.60 MB |
~Get Your Files Here !/15 - Network Attacks/78 - SYN Flood Attack.mp4 | 12.23 MB |
~Get Your Files Here !/15 - Network Attacks/79 - MAC Flood Attacks.mp4 | 11.69 MB |
~Get Your Files Here !/15 - Network Attacks/80 - ManintheMiddle Attacks.mp4 | 6.66 MB |
~Get Your Files Here !/15 - Network Attacks/81 - ARP Poisoning Attacks.mp4 | 19.30 MB |
~Get Your Files Here !/15 - Network Attacks/82 - DNS Attacks.mp4 | 32.81 MB |
~Get Your Files Here !/16 - Password Attacks/83 - Brute Force Attacks.mp4 | 18.83 MB |
~Get Your Files Here !/16 - Password Attacks/84 - Password Hashes.mp4 | 22.68 MB |
~Get Your Files Here !/16 - Password Attacks/85 - Birthday Attacks.mp4 | 26.97 MB |
~Get Your Files Here !/16 - Password Attacks/86 - Replay Attacks.mp4 | 13.32 MB |
~Get Your Files Here !/16 - Password Attacks/87 - Hijacking and Related Attacks.mp4 | 21.75 MB |
~Get Your Files Here !/16 - Password Attacks/88 - Driver Manipulation.mp4 | 11.16 MB |
~Get Your Files Here !/17 - ZeroDay Attacks/89 - ZeroDay Attacks.mp4 | 15.27 MB |
~Get Your Files Here !/18 - Code Attacks/90 - Code Reuse and SDKs.mp4 | 16.84 MB |
~Get Your Files Here !/18 - Code Attacks/91 - Code Quality and Testing.mp4 | 11.27 MB |
~Get Your Files Here !/18 - Code Attacks/92 - Development LifeCycle Models.mp4 | 14.36 MB |
~Get Your Files Here !/18 - Code Attacks/93 - Secure DevOps.mp4 | 12.53 MB |
~Get Your Files Here !/18 - Code Attacks/94 - Version Control and Change Management.mp4 | 9.96 MB |
~Get Your Files Here !/18 - Code Attacks/95 - Provisioning and Deprovisioning.mp4 | 7.35 MB |
~Get Your Files Here !/19 - Web Server Attacks/100 - CrossSite Scripting.mp4 | 25.13 MB |
~Get Your Files Here !/19 - Web Server Attacks/96 - Web Servers.mp4 | 5.42 MB |
~Get Your Files Here !/19 - Web Server Attacks/97 - SQL Injection Attacks.mp4 | 19.63 MB |
~Get Your Files Here !/19 - Web Server Attacks/98 - Protecting Against SQL Injection Attacks.mp4 | 11.07 MB |
~Get Your Files Here !/19 - Web Server Attacks/99 - DLL Injection.mp4 | 11.80 MB |
~Get Your Files Here !/2 - Basic Security Concepts/10 - Introducing Basic Risk Concepts.mp4 | 11.07 MB |
~Get Your Files Here !/2 - Basic Security Concepts/2 - What is Security.mp4 | 8.50 MB |
~Get Your Files Here !/2 - Basic Security Concepts/3 - PrivacyIntegrityAvailability.mp4 | 15.07 MB |
~Get Your Files Here !/2 - Basic Security Concepts/4 - Encryption and Access Control.mp4 | 11.76 MB |
~Get Your Files Here !/2 - Basic Security Concepts/5 - 3 A Rule Authentication Authorization and Accounting.mp4 | 12.10 MB |
~Get Your Files Here !/2 - Basic Security Concepts/6 - Threat.mp4 | 12.56 MB |
~Get Your Files Here !/2 - Basic Security Concepts/7 - What is a Hacker.mp4 | 17.69 MB |
~Get Your Files Here !/2 - Basic Security Concepts/8 - What is Attack What are the Stages.mp4 | 12.02 MB |
~Get Your Files Here !/2 - Basic Security Concepts/9 - Single Point Of Failure SPOF.mp4 | 10.36 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/101 - Social Engineering.mp4 | 20.52 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/102 - Shoulder Surfing.mp4 | 4.40 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/103 - Tricking Users with Hoaxes.mp4 | 4.97 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/104 - Tailgating and Mantraps.mp4 | 5.66 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/105 - Dumpster Diving.mp4 | 7.59 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/106 - Watering Hole Attacks.mp4 | 5.57 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/107 - Spam.mp4 | 9.49 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/108 - Phishing.mp4 | 59.77 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/109 - Whaling.mp4 | 13.14 MB |
~Get Your Files Here !/20 - Social Engineering Attacks/110 - Vishing.mp4 | 14.80 MB |
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/111 - Buffer Overflow Attacks.mp4 | 17.16 MB |
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/112 - Pointer Dereference.mp4 | 8.50 MB |
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/113 - Compiled Versus Runtime Code.mp4 | 5.42 MB |
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/114 - Proper Input Validation.mp4 | 16.61 MB |
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/115 - Side Input Validation.mp4 | 13.35 MB |
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/116 - Avoiding Race Conditions.mp4 | 9.79 MB |
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/117 - Proper Error Handling.mp4 | 9.11 MB |
~Get Your Files Here !/21 - Memory Buffer Vulnerabilities/118 - Cryptographic Techniques.mp4 | 7.05 MB |
~Get Your Files Here !/22 - Preventing Attacks/119 - Protecting Systems from Malware.mp4 | 8.34 MB |
~Get Your Files Here !/22 - Preventing Attacks/120 - Antivirus and AntiMalware Software.mp4 | 44.33 MB |
~Get Your Files Here !/22 - Preventing Attacks/121 - Advanced Malware Tools.mp4 | 13.35 MB |
~Get Your Files Here !/22 - Preventing Attacks/122 - Educating Users.mp4 | 7.45 MB |
~Get Your Files Here !/23 - Server Security/123 - Implementing Secure Systems.mp4 | 17.95 MB |
~Get Your Files Here !/23 - Server Security/124 - Operating systems.mp4 | 12.74 MB |
~Get Your Files Here !/23 - Server Security/125 - Secure Operating System Configurations.mp4 | 36.40 MB |
~Get Your Files Here !/23 - Server Security/126 - Resiliency and Automation Strategies.mp4 | 26.50 MB |
~Get Your Files Here !/23 - Server Security/127 - Change Management Policy.mp4 | 64.81 MB |
~Get Your Files Here !/23 - Server Security/128 - Secure Staging and Deployment.mp4 | 22.80 MB |
~Get Your Files Here !/23 - Server Security/129 - Peripherals.mp4 | 20.71 MB |
~Get Your Files Here !/23 - Server Security/130 - EMI and EMP.mp4 | 34.46 MB |
~Get Your Files Here !/23 - Server Security/131 - Hardware Security Module.mp4 | 8.30 MB |
~Get Your Files Here !/23 - Server Security/132 - Cloud Deployment Models.mp4 | 19.55 MB |
~Get Your Files Here !/23 - Server Security/133 - Cloud Services.mp4 | 67.28 MB |
~Get Your Files Here !/23 - Server Security/134 - Security Responsibilities with Cloud Models.mp4 | 11.56 MB |
~Get Your Files Here !/23 - Server Security/135 - Advanced Cloud Services.mp4 | 16.58 MB |
~Get Your Files Here !/24 - Mobile Devices/136 - Deploying Mobile Devices Securely.mp4 | 7.11 MB |
~Get Your Files Here !/24 - Mobile Devices/137 - Deployment Models.mp4 | 44.34 MB |
~Get Your Files Here !/24 - Mobile Devices/138 - Mobile Device Management.mp4 | 39.20 MB |
~Get Your Files Here !/24 - Mobile Devices/139 - Unauthorized Connections.mp4 | 15.28 MB |
~Get Your Files Here !/24 - Mobile Devices/140 - Hardware Control.mp4 | 7.76 MB |
~Get Your Files Here !/25 - Data Security/141 - Protecting Data.mp4 | 44.55 MB |
~Get Your Files Here !/25 - Data Security/142 - Data Loss Prevention.mp4 | 17.13 MB |
~Get Your Files Here !/26 - Database Security/143 - Database Concepts.mp4 | 9.03 MB |
~Get Your Files Here !/26 - Database Security/144 - Normalization.mp4 | 13.65 MB |
~Get Your Files Here !/26 - Database Security/145 - SQL Queries.mp4 | 7.82 MB |
~Get Your Files Here !/26 - Database Security/146 - Database Security.mp4 | 2.95 MB |
~Get Your Files Here !/27 - Risk Management/147 - Understanding Risk Management.mp4 | 8.93 MB |
~Get Your Files Here !/27 - Risk Management/148 - Risk Management.mp4 | 8.11 MB |
~Get Your Files Here !/27 - Risk Management/149 - Threats and Threat Assessments.mp4 | 13.67 MB |
~Get Your Files Here !/27 - Risk Management/150 - Vulnerabilities.mp4 | 5.76 MB |
~Get Your Files Here !/27 - Risk Management/151 - Risk Assessment.mp4 | 40.12 MB |
~Get Your Files Here !/27 - Risk Management/152 - Risk Registers.mp4 | 19.02 MB |
~Get Your Files Here !/28 - Cloud Vendors Relationships/153 - Finding and Evaluating Cloud Vendors.mp4 | 39.22 MB |
~Get Your Files Here !/28 - Cloud Vendors Relationships/154 - Job Notification.mp4 | 10.81 MB |
~Get Your Files Here !/28 - Cloud Vendors Relationships/155 - Conducting Evaluations.mp4 | 13.09 MB |
~Get Your Files Here !/28 - Cloud Vendors Relationships/156 - Negotiating Contracts and Billing.mp4 | 31.59 MB |
~Get Your Files Here !/28 - Cloud Vendors Relationships/157 - Professional Services.mp4 | 14.54 MB |
~Get Your Files Here !/28 - Cloud Vendors Relationships/158 - Chargebacks.mp4 | 42.27 MB |
~Get Your Files Here !/28 - Cloud Vendors Relationships/159 - Laws Regulations And Safety Standards.mp4 | 11.43 MB |
~Get Your Files Here !/29 - Advising/160 - Key Stakeholders.mp4 | 13.84 MB |
~Get Your Files Here !/29 - Advising/161 - Using Baselines.mp4 | 9.85 MB |
~Get Your Files Here !/29 - Advising/162 - Conducting Feasibility Study.mp4 | 9.26 MB |
~Get Your Files Here !/29 - Advising/163 - Making GAP Analysis.mp4 | 9.70 MB |
~Get Your Files Here !/29 - Advising/164 - Using Reporting.mp4 | 4.98 MB |
~Get Your Files Here !/29 - Advising/165 - Understanding Benchmarks.mp4 | 11.58 MB |
~Get Your Files Here !/3 - Identity Management/11 - What is Identity Management.mp4 | 8.41 MB |
~Get Your Files Here !/3 - Identity Management/12 - KERBEROS NTLMLDAP.mp4 | 21.17 MB |
~Get Your Files Here !/3 - Identity Management/13 - Single SignOn SSO.mp4 | 27.63 MB |
~Get Your Files Here !/3 - Identity Management/14 - Smart Cards.mp4 | 8.54 MB |
~Get Your Files Here !/3 - Identity Management/15 - Tokens or Key Fobs.mp4 | 14.48 MB |
~Get Your Files Here !/3 - Identity Management/16 - Biometric Methods.mp4 | 69.40 MB |
~Get Your Files Here !/3 - Identity Management/17 - DualFactor and Multifactor Authentication.mp4 | 3.99 MB |
~Get Your Files Here !/3 - Identity Management/18 - PAP CHAP MSCHAP.mp4 | 8.33 MB |
~Get Your Files Here !/3 - Identity Management/19 - RADIUS.mp4 | 14.83 MB |
~Get Your Files Here !/30 - Checking for Vulnerabilities/166 - Checking for Vulnerabilities.mp4 | 6.33 MB |
~Get Your Files Here !/30 - Checking for Vulnerabilities/167 - Password Crackers.mp4 | 6.38 MB |
~Get Your Files Here !/30 - Checking for Vulnerabilities/168 - Network Scanners.mp4 | 20.96 MB |
~Get Your Files Here !/30 - Checking for Vulnerabilities/169 - Wireless Scanners Cracker.mp4 | 31.95 MB |
~Get Your Files Here !/30 - Checking for Vulnerabilities/170 - Banner Grabbing.mp4 | 4.31 MB |
~Get Your Files Here !/30 - Checking for Vulnerabilities/171 - Vulnerability Scanning.mp4 | 68.46 MB |
~Get Your Files Here !/31 - Penetration Tests/172 - Penetration Tests.mp4 | 8.89 MB |
~Get Your Files Here !/31 - Penetration Tests/173 - Passive Active Reconnaissance.mp4 | 6.02 MB |
~Get Your Files Here !/31 - Penetration Tests/174 - Initial Exploitation.mp4 | 11.58 MB |
~Get Your Files Here !/31 - Penetration Tests/175 - White Gray and Black Box Testing.mp4 | 8.99 MB |
~Get Your Files Here !/31 - Penetration Tests/176 - Intrusive and NonIntrusive Testing.mp4 | 3.88 MB |
~Get Your Files Here !/31 - Penetration Tests/177 - Passive Versus Active Tools.mp4 | 70.00 MB |
~Get Your Files Here !/32 - Physical Security Precautions/178 - Comparing Physical Security Controls.mp4 | 10.32 MB |
~Get Your Files Here !/32 - Physical Security Precautions/179 - Comparing Door Lock Types.mp4 | 16.92 MB |
~Get Your Files Here !/32 - Physical Security Precautions/180 - Preventing Tailgating with Mantraps.mp4 | 6.26 MB |
~Get Your Files Here !/32 - Physical Security Precautions/181 - Increasing Physical Security with Guards.mp4 | 27.02 MB |
~Get Your Files Here !/32 - Physical Security Precautions/182 - Using Hardware Locks.mp4 | 9.41 MB |
~Get Your Files Here !/32 - Physical Security Precautions/183 - Asset Management.mp4 | 7.57 MB |
~Get Your Files Here !/32 - Physical Security Precautions/184 - Implementing Environmental Controls.mp4 | 57.21 MB |
~Get Your Files Here !/33 - Single Point of Failure/185 - Single Point of Failure.mp4 | 5.38 MB |
~Get Your Files Here !/33 - Single Point of Failure/186 - Disk Redundancies.mp4 | 15.79 MB |
~Get Your Files Here !/33 - Single Point of Failure/187 - Server Redundancy and High Availability.mp4 | 50.18 MB |
~Get Your Files Here !/33 - Single Point of Failure/188 - Backup.mp4 | 60.57 MB |
~Get Your Files Here !/34 - Business Continuity Plans/189 - Comparing Business Continuity Elements.mp4 | 26.22 MB |
~Get Your Files Here !/34 - Business Continuity Plans/190 - Impact.mp4 | 10.48 MB |
~Get Your Files Here !/34 - Business Continuity Plans/191 - Recovery Time Objective.mp4 | 15.12 MB |
~Get Your Files Here !/34 - Business Continuity Plans/192 - Recovery Sites.mp4 | 17.09 MB |
~Get Your Files Here !/34 - Business Continuity Plans/193 - Disaster Recovery.mp4 | 29.30 MB |
~Get Your Files Here !/35 - Examination of Logs/194 - Monitoring Logs for Event Anomalies.mp4 | 52.47 MB |
~Get Your Files Here !/35 - Examination of Logs/195 - OtherLogsSIEM.mp4 | 21.24 MB |
~Get Your Files Here !/35 - Examination of Logs/196 - Continuous Monitoring.mp4 | 16.35 MB |
~Get Your Files Here !/36 - Controls/197 - Understanding Control Types.mp4 | 29.81 MB |
~Get Your Files Here !/36 - Controls/198 - Control Goals.mp4 | 42.47 MB |
~Get Your Files Here !/37 - Cryptography and PKI/199 - Introducing Cryptography Concepts.mp4 | 10.26 MB |
~Get Your Files Here !/37 - Cryptography and PKI/200 - Hashing.mp4 | 12.96 MB |
~Get Your Files Here !/37 - Cryptography and PKI/201 - MD5.mp4 | 2.57 MB |
~Get Your Files Here !/37 - Cryptography and PKI/202 - SHA.mp4 | 8.04 MB |
~Get Your Files Here !/37 - Cryptography and PKI/203 - HMAC.mp4 | 7.36 MB |
~Get Your Files Here !/37 - Cryptography and PKI/204 - Hashing Files.mp4 | 8.80 MB |
~Get Your Files Here !/37 - Cryptography and PKI/205 - Digital Signatures Certificates and Nonrepudiation.mp4 | 9.75 MB |
~Get Your Files Here !/37 - Cryptography and PKI/206 - Providing Confidentiality with Encryption.mp4 | 33.09 MB |
~Get Your Files Here !/37 - Cryptography and PKI/207 - Block Versus Stream Ciphers.mp4 | 14.78 MB |
~Get Your Files Here !/37 - Cryptography and PKI/208 - Symmetric Encryption.mp4 | 6.09 MB |
~Get Your Files Here !/37 - Cryptography and PKI/209 - Symmetric Encryption Methods.mp4 | 18.27 MB |
~Get Your Files Here !/37 - Cryptography and PKI/210 - Asymmetric Encryption.mp4 | 7.02 MB |
~Get Your Files Here !/37 - Cryptography and PKI/211 - Certificates.mp4 | 11.43 MB |
~Get Your Files Here !/37 - Cryptography and PKI/212 - Steganography And Obfuscation.mp4 | 10.10 MB |
~Get Your Files Here !/37 - Cryptography and PKI/213 - Using Cryptographic Protocols.mp4 | 5.59 MB |
~Get Your Files Here !/37 - Cryptography and PKI/214 - Cipher Suites.mp4 | 8.74 MB |
~Get Your Files Here !/37 - Cryptography and PKI/215 - Exploring PKI Components.mp4 | 53.94 MB |
~Get Your Files Here !/37 - Cryptography and PKI/216 - Comparing Certificate Types.mp4 | 14.47 MB |
~Get Your Files Here !/38 - Secure Web Page/217 - HTTPS Transport Encryption.mp4 | 14.71 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/218 - Exploring Security Policies.mp4 | 4.33 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/219 - Personnel Management Policies.mp4 | 35.65 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/220 - Background Check.mp4 | 14.90 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/221 - NDA.mp4 | 16.93 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/222 - Policy Violations and Adverse Actions.mp4 | 5.90 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/223 - Agreement Types.mp4 | 11.12 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/224 - PII and PHI.mp4 | 14.71 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/225 - Responding to Incidents.mp4 | 7.73 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/226 - Providing Training.mp4 | 18.30 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/227 - Troubleshooting Personnel Issues.mp4 | 7.63 MB |
~Get Your Files Here !/39 - Risk Mitigation Methods/228 - Incident ResponseEducation.mp4 | 17.54 MB |
~Get Your Files Here !/4 - Users in CompTIA/20 - Create a User in comptia.mp4 | 6.14 MB |
~Get Your Files Here !/4 - Users in CompTIA/21 - Managing Accounts 1.mp4 | 45.00 MB |
~Get Your Files Here !/4 - Users in CompTIA/22 - Managing Accounts 2.mp4 | 41.64 MB |
~Get Your Files Here !/4 - Users in CompTIA/23 - Passwords.mp4 | 22.80 MB |
~Get Your Files Here !/4 - Users in CompTIA/24 - Password Policy.mp4 | 27.18 MB |
~Get Your Files Here !/40 - Extra/229 - Security CompTIA Security Plus SY0701 Certification Prep.html | 266 B |
~Get Your Files Here !/5 - Comparing Access Control Models/25 - Comparing Access Control Models.mp4 | 7.90 MB |
~Get Your Files Here !/5 - Comparing Access Control Models/26 - RoleBased Access Control.mp4 | 10.76 MB |
~Get Your Files Here !/5 - Comparing Access Control Models/27 - Establishing Access with GroupBased Privileges.mp4 | 14.45 MB |
~Get Your Files Here !/5 - Comparing Access Control Models/28 - Rule Based and Discretionary Access Control.mp4 | 17.52 MB |
~Get Your Files Here !/5 - Comparing Access Control Models/29 - Mandatory Access Control.mp4 | 8.51 MB |
~Get Your Files Here !/6 - Virtualization/30 - What is Virtualization.mp4 | 15.60 MB |
~Get Your Files Here !/6 - Virtualization/31 - Virtualization Technologies.mp4 | 28.10 MB |
~Get Your Files Here !/6 - Virtualization/32 - Benefits of Virtualization.mp4 | 9.13 MB |
~Get Your Files Here !/6 - Virtualization/33 - Security Issues of Virtualization.mp4 | 17.78 MB |
~Get Your Files Here !/7 - Network Technologies/34 - Basic Network Concepts.mp4 | 11.10 MB |
~Get Your Files Here !/7 - Network Technologies/35 - Domain Name ServicesDNS.mp4 | 40.75 MB |
~Get Your Files Here !/7 - Network Technologies/36 - What is the port How does it work.mp4 | 25.84 MB |
~Get Your Files Here !/7 - Network Technologies/37 - What is the Network Address.mp4 | 12.71 MB |
~Get Your Files Here !/7 - Network Technologies/38 - Combining the IP Address and the Port.mp4 | 16.67 MB |
~Get Your Files Here !/7 - Network Technologies/39 - Switches.mp4 | 13.26 MB |
~Get Your Files Here !/7 - Network Technologies/40 - Bridge.mp4 | 15.29 MB |
~Get Your Files Here !/7 - Network Technologies/41 - Understanding NAT and PAT.mp4 | 11.25 MB |
~Get Your Files Here !/7 - Network Technologies/42 - Network Separation.mp4 | 24.38 MB |
~Get Your Files Here !/7 - Network Technologies/43 - Proxy Servers.mp4 | 7.26 MB |
~Get Your Files Here !/7 - Network Technologies/44 - Types of Using Network Technologies 1.mp4 | 11.01 MB |
~Get Your Files Here !/7 - Network Technologies/45 - Routers.mp4 | 19.97 MB |
~Get Your Files Here !/7 - Network Technologies/46 - Types of Using Network Technologies 2.mp4 | 25.50 MB |
~Get Your Files Here !/8 - Wireless Networks/47 - Reviewing Basic Wireless Network Information.mp4 | 22.57 MB |
~Get Your Files Here !/8 - Wireless Networks/48 - Wireless Cryptographic Protocols.mp4 | 17.12 MB |
~Get Your Files Here !/8 - Wireless Networks/49 - Authentication Protocols for Wireless Networks.mp4 | 20.83 MB |
~Get Your Files Here !/9 - Network Security Technologies/50 - Firewalls.mp4 | 18.30 MB |
~Get Your Files Here !/9 - Network Security Technologies/51 - Network Access Control.mp4 | 8.25 MB |
~Get Your Files Here !/9 - Network Security Technologies/52 - Implementing a Secure Network.mp4 | 35.61 MB |
~Get Your Files Here !/Bonus Resources.txt | 386 B |
udp://tracker.torrent.eu.org:451/announce |
udp://tracker.tiny-vps.com:6969/announce |
http://tracker.foreverpirates.co:80/announce |
udp://tracker.cyberia.is:6969/announce |
udp://exodus.desync.com:6969/announce |
udp://explodie.org:6969/announce |
udp://tracker.opentrackr.org:1337/announce |
udp://9.rarbg.to:2780/announce |
udp://tracker.internetwarriors.net:1337/announce |
udp://ipv4.tracker.harry.lu:80/announce |
udp://open.stealth.si:80/announce |
udp://9.rarbg.to:2900/announce |
udp://9.rarbg.me:2720/announce |
udp://opentor.org:2710/announce |
udp://open.demonii.com:1337/announce |
udp://p4p.arenabg.com:1337/announce |
udp://tracker.dler.org:6969/announce |
udp://movies.zsw.ca:6969/announce |
udp://tracker.openbittorrent.com:6969/announce |
udp://uploads.gamecoast.net:6969/announce |
udp://ipv6.tracker.harry.lu:80/announce |
udp://tracker1.bt.moack.co.kr:80/announce |
udp://opentracker.i2p.rocks:6969/announce |
udp://eddie4.nl:6969/announce |
udp://bt1.archive.org:6969/announce |
udp://tracker.swateam.org.uk:2710/announce |
http://tracker.openbittorrent.com:80/announce |
http://tracker.opentrackr.org:1337/announce |
https://tracker1.520.jp:443/announce |
https://tracker.tamersunion.org:443/announce |
https://tracker.imgoingto.icu:443/announce |
http://nyaa.tracker.wf:7777/announce |
udp://tracker2.dler.org:80/announce |
udp://tracker.theoks.net:6969/announce |
udp://tracker.dump.cl:6969/announce |
udp://tracker.bittor.pw:1337/announce |
udp://tracker.4.babico.name.tr:3131/announce |
udp://sanincode.com:6969/announce |
udp://retracker01-msk-virt.corbina.net:80/announce |
udp://private.anonseed.com:6969/announce |
udp://open.free-tracker.ga:6969/announce |
udp://isk.richardsw.club:6969/announce |
udp://htz3.noho.st:6969/announce |
udp://epider.me:6969/announce |
udp://bt.ktrackers.com:6666/announce |
udp://acxx.de:6969/announce |
udp://aarsen.me:6969/announce |
udp://6ahddutb1ucc3cp.ru:6969/announce |
udp://yahor.of.by:6969/announce |
udp://v2.iperson.xyz:6969/announce |
udp://tracker1.myporn.club:9337/announce |
udp://tracker.therarbg.com:6969/announce |
udp://tracker.qu.ax:6969/announce |
udp://tracker.publictracker.xyz:6969/announce |
udp://tracker.netmap.top:6969/announce |
udp://tracker.farted.net:6969/announce |
udp://tracker.cubonegro.lol:6969/announce |
udp://tracker.ccp.ovh:6969/announce |
udp://tracker.0x7c0.com:6969/announce |
udp://thouvenin.cloud:6969/announce |
udp://thinking.duckdns.org:6969/announce |
udp://tamas3.ynh.fr:6969/announce |
udp://ryjer.com:6969/announce |
udp://run.publictracker.xyz:6969/announce |
udp://run-2.publictracker.xyz:6969/announce |
udp://public.tracker.vraphim.com:6969/announce |
udp://public.publictracker.xyz:6969/announce |
udp://public-tracker.cf:6969/announce |
udp://opentracker.io:6969/announce |
udp://open.u-p.pw:6969/announce |
udp://open.dstud.io:6969/announce |
udp://oh.fuuuuuck.com:6969/announce |
udp://new-line.net:6969/announce |
udp://moonburrow.club:6969/announce |
udp://mail.segso.net:6969/announce |
udp://free.publictracker.xyz:6969/announce |
udp://carr.codes:6969/announce |
udp://bt2.archive.org:6969/announce |
udp://6.pocketnet.app:6969/announce |
udp://1c.premierzal.ru:6969/announce |
udp://tracker.t-rb.org:6969/announce |
udp://tracker.srv00.com:6969/announce |
udp://tracker.artixlinux.org:6969/announce |
udp://tracker-udp.gbitt.info:80/announce |
udp://torrents.artixlinux.org:6969/announce |
udp://psyco.fr:6969/announce |
udp://mail.artixlinux.org:6969/announce |
udp://lloria.fr:6969/announce |
udp://fh2.cmp-gaming.com:6969/announce |
udp://concen.org:6969/announce |
udp://boysbitte.be:6969/announce |
udp://aegir.sexy:6969/announce |
TorrentBank
Copyright © 2024