Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
8B |
001 Welcome.en.srt |
12.11KB |
001 Welcome.mp4 |
91.41MB |
002 CompTIA-Security-601-Study-Guide.pdf |
22.89MB |
002 CompTIA-Security-Study-Notes-501.pdf |
19.28MB |
002 Download the Study Guide.html |
1.09KB |
003 Overview of Security.en.srt |
6.80KB |
003 Overview of Security.mp4 |
64.44MB |
004 CIA Triad.en.srt |
8.66KB |
004 CIA Triad.mp4 |
74.47MB |
005 AAA of Security (OBJ 2.4).en.srt |
7.07KB |
005 AAA of Security (OBJ 2.4).mp4 |
59.85MB |
006 Security Threats (OBJ 1.1 & 1.2).en.srt |
6.24KB |
006 Security Threats (OBJ 1.1 & 1.2).mp4 |
64.17MB |
007 Mitigating Threats (OBJ 5.1).en.srt |
5.92KB |
007 Mitigating Threats (OBJ 5.1).mp4 |
56.32MB |
008 Hackers (OBJ 1.5).en.srt |
10.42KB |
008 Hackers (OBJ 1.5).mp4 |
104.89MB |
009 Threat Actors (1.5).en.srt |
6.80KB |
009 Threat Actors (1.5).mp4 |
68.27MB |
010 __ Threat Intelligence and Sources (OBJ 1.5).en.srt |
20.59KB |
010 __ Threat Intelligence and Sources (OBJ 1.5).mp4 |
58.00MB |
011 __ Threat Hunting (OBJ 1.7).en.srt |
16.03KB |
011 __ Threat Hunting (OBJ 1.7).mp4 |
42.98MB |
012 __ Attack Frameworks (OBJ 4.2).en.srt |
26.01KB |
012 __ Attack Frameworks (OBJ 4.2).mp4 |
87.68MB |
013 Malware (OBJ 1.2).en.srt |
1.26KB |
013 Malware (OBJ 1.2).mp4 |
15.01MB |
014 Viruses (OBJ 1.2).en.srt |
13.35KB |
014 Viruses (OBJ 1.2).mp4 |
134.66MB |
015 Worms (OBJ 1.2).en.srt |
4.41KB |
015 Worms (OBJ 1.2).mp4 |
47.86MB |
016 Trojans (OBJ 1.2).en.srt |
7.20KB |
016 Trojans (OBJ 1.2).mp4 |
62.50MB |
017 Demo_ Viruses and Trojans (OBJ 1.2).en.srt |
13.37KB |
017 Demo_ Viruses and Trojans (OBJ 1.2).mp4 |
91.56MB |
018 Ransomware (OBJ 1.2).en.srt |
5.21KB |
018 Ransomware (OBJ 1.2).mp4 |
53.37MB |
019 Spyware (OBJ 1.2).en.srt |
5.70KB |
019 Spyware (OBJ 1.2).mp4 |
58.14MB |
020 Rootkits (OBJ 1.2 & 1.3).en.srt |
7.20KB |
020 Rootkits (OBJ 1.2 & 1.3).mp4 |
75.59MB |
021 Spam (OBJ 1.1).en.srt |
6.14KB |
021 Spam (OBJ 1.1).mp4 |
65.14MB |
022 Summary of Malware.en.srt |
4.40KB |
022 Summary of Malware.mp4 |
44.67MB |
023 Malware Infections.en.srt |
8.93KB |
023 Malware Infections.mp4 |
93.17MB |
024 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt |
9.72KB |
024 Common Delivery Methods (OBJ 1.1 & 1.5).mp4 |
96.88MB |
025 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt |
11.67KB |
025 Demo_ Phishing (OBJ 1.1 & 5.3).mp4 |
49.92MB |
026 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt |
7.50KB |
026 Botnets and Zombies (OBJ 1.2 & 1.4).mp4 |
62.46MB |
027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt |
5.51KB |
027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4 |
40.59MB |
028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt |
11.88KB |
028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4 |
75.49MB |
029 Backdoors and Logic Bombs (OBJ 1.2).en.srt |
8.30KB |
029 Backdoors and Logic Bombs (OBJ 1.2).mp4 |
84.09MB |
030 Symptoms of Infection (OBJ 1.2).en.srt |
9.18KB |
030 Symptoms of Infection (OBJ 1.2).mp4 |
91.40MB |
031 Removing Malware (OBJ 4.2).en.srt |
11.31KB |
031 Removing Malware (OBJ 4.2).mp4 |
108.29MB |
032 Preventing Malware (OBJ 1.6 & 3.2).en.srt |
12.80KB |
032 Preventing Malware (OBJ 1.6 & 3.2).mp4 |
128.84MB |
033 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt |
18.25KB |
033 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4 |
39.54MB |
034 Security Applications and Devices.en.srt |
1.18KB |
034 Security Applications and Devices.mp4 |
12.76MB |
035 Software Firewalls (OBJ 3.2).en.srt |
8.57KB |
035 Software Firewalls (OBJ 3.2).mp4 |
91.43MB |
036 Demo_ Software Firewalls (OBJ 3.2).en.srt |
14.21KB |
036 Demo_ Software Firewalls (OBJ 3.2).mp4 |
61.53MB |
037 IDS (OBJ 3.2 & 3.3).en.srt |
10.78KB |
037 IDS (OBJ 3.2 & 3.3).mp4 |
105.77MB |
038 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).en.srt |
6.95KB |
038 Pop-up Blockers (OBJ 1.1, 3.3, 4.4).mp4 |
66.62MB |
039 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).en.srt |
8.13KB |
039 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4).mp4 |
81.64MB |
040 Securing the BIOS (OBJ 3.2).en.srt |
8.53KB |
040 Securing the BIOS (OBJ 3.2).mp4 |
86.17MB |
041 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).en.srt |
7.10KB |
041 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3).mp4 |
73.04MB |
042 Disk Encryption (OBJ 2.1, 2.8 & 3.2).en.srt |
9.57KB |
042 Disk Encryption (OBJ 2.1, 2.8 & 3.2).mp4 |
106.73MB |
043 __ Endpoint Analysis (OBJ 3.1 & 3.3).en.srt |
12.65KB |
043 __ Endpoint Analysis (OBJ 3.1 & 3.3).mp4 |
52.40MB |
044 Mobile Device Security (OBJ 1.5).en.srt |
2.76KB |
044 Mobile Device Security (OBJ 1.5).mp4 |
28.44MB |
045 Securing Wireless Devices (OBJ 3.4 & 3.5).en.srt |
2.87KB |
045 Securing Wireless Devices (OBJ 3.4 & 3.5).mp4 |
33.55MB |
046 Mobile Malware (OBJ 1.1 & 3.5).en.srt |
14.02KB |
046 Mobile Malware (OBJ 1.1 & 3.5).mp4 |
139.49MB |
047 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).en.srt |
8.69KB |
047 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6).mp4 |
86.69MB |
048 Bluetooth Attacks (OBJ 1.4 & 3.4).en.srt |
4.36KB |
048 Bluetooth Attacks (OBJ 1.4 & 3.4).mp4 |
47.75MB |
049 Mobile Device Theft (OBJ 3.5).en.srt |
6.86KB |
049 Mobile Device Theft (OBJ 3.5).mp4 |
69.78MB |
050 Security of Apps (OBJ 3.1 & 3.5).en.srt |
11.01KB |
050 Security of Apps (OBJ 3.1 & 3.5).mp4 |
109.42MB |
051 BYOD (OBJ 3.5).en.srt |
10.69KB |
051 BYOD (OBJ 3.5).mp4 |
107.63MB |
052 Hardening Mobile Devices (OBJ 3.5).en.srt |
7.62KB |
052 Hardening Mobile Devices (OBJ 3.5).mp4 |
81.84MB |
053 Hardening (OBJ 3.2).en.srt |
3.67KB |
053 Hardening (OBJ 3.2).mp4 |
39.72MB |
054 Unnecessary Applications (OBJ 1.6).en.srt |
6.52KB |
054 Unnecessary Applications (OBJ 1.6).mp4 |
69.15MB |
055 Restricting Applications (OBJ 3.2 & 4.4).en.srt |
6.31KB |
055 Restricting Applications (OBJ 3.2 & 4.4).mp4 |
61.92MB |
056 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).en.srt |
11.27KB |
056 Demo_ Unnecessary Services (OBJ 3.2 & 3.3).mp4 |
62.36MB |
057 Trusted Operating System (OBJ 3.2).en.srt |
3.94KB |
057 Trusted Operating System (OBJ 3.2).mp4 |
42.64MB |
058 Updates and Patches (OBJ 1.6 & 3.2).en.srt |
6.93KB |
058 Updates and Patches (OBJ 1.6 & 3.2).mp4 |
74.21MB |
059 Patch Management (OBJ 1.6 & 3.2).en.srt |
8.01KB |
059 Patch Management (OBJ 1.6 & 3.2).mp4 |
83.43MB |
060 Group Policies (OBJ 2.1).en.srt |
5.14KB |
060 Group Policies (OBJ 2.1).mp4 |
56.44MB |
061 Demo_ Group Policies (OBJ 3.2).en.srt |
8.28KB |
061 Demo_ Group Policies (OBJ 3.2).mp4 |
30.89MB |
062 File Systems and Hard Drives (OBJ 2.1 & 3.2).en.srt |
6.57KB |
062 File Systems and Hard Drives (OBJ 2.1 & 3.2).mp4 |
69.02MB |
063 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).en.srt |
13.20KB |
063 __ Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6).mp4 |
42.60MB |
064 __ Root of Trust (OBJ 3.2).en.srt |
10.60KB |
064 __ Root of Trust (OBJ 3.2).mp4 |
31.06MB |
065 __ Trusted Firmware (OBJ 3.2).en.srt |
11.59KB |
065 __ Trusted Firmware (OBJ 3.2).mp4 |
33.00MB |
066 __ Secure Processing (OBJ 3.2).en.srt |
8.96KB |
066 __ Secure Processing (OBJ 3.2).mp4 |
24.51MB |
067 Virtualization (OBJ 2.2).en.srt |
4.56KB |
067 Virtualization (OBJ 2.2).mp4 |
46.65MB |
068 Hypervisors (OBJ 2.2).en.srt |
5.27KB |
068 Hypervisors (OBJ 2.2).mp4 |
57.45MB |
069 Demo_ How to create a VM (OBJ 2.2).en.srt |
8.35KB |
069 Demo_ How to create a VM (OBJ 2.2).mp4 |
38.72MB |
070 Threats to VMs (OBJ 2.2).en.srt |
7.83KB |
070 Threats to VMs (OBJ 2.2).mp4 |
80.93MB |
071 Securing VMs (OBJ 2.2).en.srt |
8.15KB |
071 Securing VMs (OBJ 2.2).mp4 |
82.44MB |
072 Demo_ Securing VMs.en.srt |
9.24KB |
072 Demo_ Securing VMs.mp4 |
43.11MB |
073 Application Security.en.srt |
3.68KB |
073 Application Security.mp4 |
38.61MB |
074 Web Browser Security (OBJ 3.2 & 3.3).en.srt |
15.51KB |
074 Web Browser Security (OBJ 3.2 & 3.3).mp4 |
145.13MB |
075 Web Browser Concerns (OBJ 3.2 & 3.3).en.srt |
7.37KB |
075 Web Browser Concerns (OBJ 3.2 & 3.3).mp4 |
71.04MB |
076 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).en.srt |
11.47KB |
076 Demo_ Web Browser Configuration (OBJ 3.2 & 3.3).mp4 |
46.06MB |
077 Securing Applications (OBJ 1.4 & 3.2).en.srt |
10.09KB |
077 Securing Applications (OBJ 1.4 & 3.2).mp4 |
101.49MB |
078 Software Development (OBJ 2.1 & 2.3).en.srt |
19.35KB |
078 Software Development (OBJ 2.1 & 2.3).mp4 |
188.76MB |
079 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).en.srt |
13.75KB |
079 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3).mp4 |
136.96MB |
080 Testing Methods (OBJ 2.3 & 3.2).en.srt |
15.01KB |
080 Testing Methods (OBJ 2.3 & 3.2).mp4 |
151.04MB |
081 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).en.srt |
8.06KB |
081 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6).mp4 |
80.73MB |
082 Buffer Overflows (OBJ 1.3).en.srt |
13.56KB |
082 Buffer Overflows (OBJ 1.3).mp4 |
135.64MB |
083 Demo_ Buffer Overflow Attack (OBJ 1.3).en.srt |
12.61KB |
083 Demo_ Buffer Overflow Attack (OBJ 1.3).mp4 |
101.76MB |
084 XSS and XSRF (OBJ 1.3).en.srt |
6.76KB |
084 XSS and XSRF (OBJ 1.3).mp4 |
68.72MB |
085 SQL Injection (OBJ 1.3).en.srt |
13.22KB |
085 SQL Injection (OBJ 1.3).mp4 |
141.47MB |
086 Demo_ SQL Injection (OBJ 1.2 & 1.3).en.srt |
14.12KB |
086 Demo_ SQL Injection (OBJ 1.2 & 1.3).mp4 |
74.85MB |
087 __ XML Vulnerabilities (OBJ 1.3).en.srt |
11.52KB |
087 __ XML Vulnerabilities (OBJ 1.3).mp4 |
49.28MB |
088 __ Race Conditions (OBJ 1.3).en.srt |
13.55KB |
088 __ Race Conditions (OBJ 1.3).mp4 |
34.59MB |
089 __ Design Vulnerabilities (OBJ 1.3).en.srt |
9.95KB |
089 __ Design Vulnerabilities (OBJ 1.3).mp4 |
26.86MB |
090 Network Security.en.srt |
1.73KB |
090 Network Security.mp4 |
16.60MB |
091 The OSI Model (OBJ 3.3 & 3.6).en.srt |
12.99KB |
091 The OSI Model (OBJ 3.3 & 3.6).mp4 |
128.51MB |
092 Switches (OBJ 1.4 & 2.7).en.srt |
7.75KB |
092 Switches (OBJ 1.4 & 2.7).mp4 |
77.26MB |
093 Routers (OBJ 3.3).en.srt |
5.38KB |
093 Routers (OBJ 3.3).mp4 |
54.31MB |
094 Network Zones (OBJ 3.3).en.srt |
7.42KB |
094 Network Zones (OBJ 3.3).mp4 |
69.46MB |
095 __ Jumpbox (OBJ 3.5).en.srt |
13.58KB |
095 __ Jumpbox (OBJ 3.5).mp4 |
35.05MB |
096 Network Access Control (OBJ 3.3 & 4.4).en.srt |
6.10KB |
096 Network Access Control (OBJ 3.3 & 4.4).mp4 |
56.67MB |
097 VLANs (OBJ 3.3).en.srt |
3.17KB |
097 VLANs (OBJ 3.3).mp4 |
33.11MB |
098 Subnetting (OBJ 3.6).en.srt |
4.38KB |
098 Subnetting (OBJ 3.6).mp4 |
41.36MB |
099 Network Address Translation (OBJ 3.3).en.srt |
5.10KB |
099 Network Address Translation (OBJ 3.3).mp4 |
52.66MB |
1 |
29B |
10 |
1.78MB |
100 |
366.29KB |
100 Telephony (OBJ 3.1).en.srt |
13.76KB |
100 Telephony (OBJ 3.1).mp4 |
130.69MB |
101 |
667.45KB |
101 Perimeter Security.en.srt |
1.83KB |
101 Perimeter Security.mp4 |
17.79MB |
102 |
999.90KB |
102 Firewalls (OBJ 3.3 & 4.4).en.srt |
17.87KB |
102 Firewalls (OBJ 3.3 & 4.4).mp4 |
175.29MB |
103 |
1.07MB |
103 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).en.srt |
8.58KB |
103 Demo_ SOHO Firewall (OBJ 3.3 & 4.4).mp4 |
28.93MB |
104 |
1.27MB |
104 Proxy Servers (OBJ 3.3 & 4.4).en.srt |
9.51KB |
104 Proxy Servers (OBJ 3.3 & 4.4).mp4 |
91.68MB |
105 |
189.96KB |
105 Honeypots and Honeynets (OBJ 2.1).en.srt |
3.12KB |
105 Honeypots and Honeynets (OBJ 2.1).mp4 |
30.69MB |
106 |
472.38KB |
106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).en.srt |
3.39KB |
106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4).mp4 |
35.35MB |
107 |
653.85KB |
107 NIDS and NIPS (OBJ 3.3).en.srt |
9.69KB |
107 NIDS and NIPS (OBJ 3.3).mp4 |
92.37MB |
108 |
759.03KB |
108 Unified Threat Management (OBJ 3.2 & 3.3).en.srt |
3.91KB |
108 Unified Threat Management (OBJ 3.2 & 3.3).mp4 |
41.62MB |
109 |
786.48KB |
109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).en.srt |
8.22KB |
109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6).mp4 |
76.42MB |
11 |
858.18KB |
110 |
1.11MB |
110 Cloud Types (OBJ 2.2 & 3.6).en.srt |
5.93KB |
110 Cloud Types (OBJ 2.2 & 3.6).mp4 |
63.19MB |
111 |
1.39MB |
111 As a Service (OBJ 2.2).en.srt |
16.19KB |
111 As a Service (OBJ 2.2).mp4 |
154.35MB |
112 |
1.58MB |
112 Cloud Security (OBJ 2.5 & 3.6).en.srt |
5.43KB |
112 Cloud Security (OBJ 2.5 & 3.6).mp4 |
53.42MB |
113 |
424.43KB |
113 Defending Servers (OBJ 1.7, 3.1, and 3.2).en.srt |
10.36KB |
113 Defending Servers (OBJ 1.7, 3.1, and 3.2).mp4 |
99.54MB |
114 |
522.11KB |
114 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).en.srt |
16.99KB |
114 __ Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6).mp4 |
50.91MB |
115 |
803.78KB |
115 __ CASB (OBJ 2.1).en.srt |
10.33KB |
115 __ CASB (OBJ 2.1).mp4 |
29.81MB |
116 |
1.15MB |
116 __ API (OBJ 2.1).en.srt |
14.04KB |
116 __ API (OBJ 2.1).mp4 |
40.62MB |
117 |
1.28MB |
117 __ FAAS and Serverless (OBJ 2.2).en.srt |
19.03KB |
117 __ FAAS and Serverless (OBJ 2.2).mp4 |
51.28MB |
118 |
1.34MB |
118 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).en.srt |
19.22KB |
118 __ Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2).mp4 |
40.96MB |
119 |
1.53MB |
119 __ Workflow Orchestration (OBJ 2.3).en.srt |
9.60KB |
119 __ Workflow Orchestration (OBJ 2.3).mp4 |
24.11MB |
12 |
1.85MB |
120 |
1.79MB |
120 __ CI_CD (OBJ 2.3).en.srt |
16.98KB |
120 __ CI_CD (OBJ 2.3).mp4 |
48.32MB |
121 |
981.79KB |
121 __ DevSecOps (OBJ 2.3).en.srt |
11.94KB |
121 __ DevSecOps (OBJ 2.3).mp4 |
31.38MB |
122 |
904.02KB |
122 __ IAC (OBJ 2.2).en.srt |
10.20KB |
122 __ IAC (OBJ 2.2).mp4 |
29.60MB |
123 |
986.41KB |
123 __ Machine Learning (OBJ 1.2).en.srt |
20.29KB |
123 __ Machine Learning (OBJ 1.2).mp4 |
68.01MB |
124 |
1.36MB |
124 Network Attacks (OBJ 1.4).en.srt |
1.42KB |
124 Network Attacks (OBJ 1.4).mp4 |
14.53MB |
125 |
229.72KB |
125 Ports and Protocols (OBJ 3.1).en.srt |
9.33KB |
125 Ports and Protocols (OBJ 3.1).mp4 |
95.70MB |
126 |
557.95KB |
126 Memorization of Ports (OBJ 3.1).en.srt |
23.57KB |
126 Memorization of Ports (OBJ 3.1).mp4 |
238.39MB |
127 |
866.91KB |
127 Unnecessary Ports (OBJ 1.6 & 3.2).en.srt |
7.70KB |
127 Unnecessary Ports (OBJ 1.6 & 3.2).mp4 |
75.22MB |
128 |
1003.36KB |
128 Denial of Service (OBJ 1.3 & 1.4).en.srt |
18.47KB |
128 Denial of Service (OBJ 1.3 & 1.4).mp4 |
170.22MB |
129 |
1.01MB |
129 DDoS (OBJ 1.2, 1.3, & 1.4).en.srt |
3.50KB |
129 DDoS (OBJ 1.2, 1.3, & 1.4).mp4 |
33.73MB |
13 |
985.37KB |
130 |
1.28MB |
130 Stopping a DDoS (OBJ 2.1 & 2.3).en.srt |
5.56KB |
130 Stopping a DDoS (OBJ 2.1 & 2.3).mp4 |
52.44MB |
131 |
1.31MB |
131 Spoofing (OBJ 1.4 & 3.3).en.srt |
2.96KB |
131 Spoofing (OBJ 1.4 & 3.3).mp4 |
28.53MB |
132 |
1.73MB |
132 Hijacking (OBJ 1.3 & 1.4).en.srt |
8.92KB |
132 Hijacking (OBJ 1.3 & 1.4).mp4 |
74.66MB |
133 |
1.99MB |
133 Replay Attack (OBJ 1.3).en.srt |
3.39KB |
133 Replay Attack (OBJ 1.3).mp4 |
32.02MB |
134 |
1.38MB |
134 Demo_ Null Sessions (OBJ 1.6).en.srt |
5.09KB |
134 Demo_ Null Sessions (OBJ 1.6).mp4 |
38.61MB |
135 |
133.40KB |
135 Transitive Attacks (OBJ 2.4).en.srt |
3.36KB |
135 Transitive Attacks (OBJ 2.4).mp4 |
31.63MB |
136 |
881.10KB |
136 DNS Attacks (OBJ 1.1, 1.4 & 3.1).en.srt |
10.32KB |
136 DNS Attacks (OBJ 1.1, 1.4 & 3.1).mp4 |
96.23MB |
137 |
1.08MB |
137 ARP Poisoning (OBJ 1.4).en.srt |
3.41KB |
137 ARP Poisoning (OBJ 1.4).mp4 |
32.57MB |
138 |
1.56MB |
138 Securing Networks (OBJ 3.3).en.srt |
2.08KB |
138 Securing Networks (OBJ 3.3).mp4 |
18.57MB |
139 |
1.83MB |
139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).en.srt |
15.95KB |
139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7).mp4 |
146.75MB |
14 |
1.65MB |
140 |
450.86KB |
140 Securing Network Media (OBJ 2.7).en.srt |
19.89KB |
140 Securing Network Media (OBJ 2.7).mp4 |
189.94MB |
141 |
825.79KB |
141 Securing WiFi Devices (OBJ 1.4 & 3.4).en.srt |
10.47KB |
141 Securing WiFi Devices (OBJ 1.4 & 3.4).mp4 |
97.01MB |
142 |
993.00KB |
142 Wireless Encryption (OBJ 1.6 & 3.4).en.srt |
12.21KB |
142 Wireless Encryption (OBJ 1.6 & 3.4).mp4 |
120.29MB |
143 |
1.29MB |
143 Wireless Access Points (OBJ 1.4 & 3.4).en.srt |
16.94KB |
143 Wireless Access Points (OBJ 1.4 & 3.4).mp4 |
136.64MB |
144 |
1.50MB |
144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).en.srt |
10.27KB |
144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8).mp4 |
91.49MB |
145 |
1.54MB |
145 Demo_ Wireless Attack (OBJ 1.4).en.srt |
13.99KB |
145 Demo_ Wireless Attack (OBJ 1.4).mp4 |
103.31MB |
146 |
1.54MB |
146 __ WPA3 (OBJ 3.4).en.srt |
12.74KB |
146 __ WPA3 (OBJ 3.4).mp4 |
39.08MB |
147 |
1.64MB |
147 Other Wireless Technologies (OBJ 1.4 & 3.5).en.srt |
14.52KB |
147 Other Wireless Technologies (OBJ 1.4 & 3.5).mp4 |
132.20MB |
148 |
78.58KB |
148 Physical Security (OBJ 2.7).en.srt |
3.81KB |
148 Physical Security (OBJ 2.7).mp4 |
33.92MB |
149 |
477.10KB |
149 Surveillance (OBJ 2.7).en.srt |
6.68KB |
149 Surveillance (OBJ 2.7).mp4 |
60.79MB |
15 |
982.02KB |
150 |
1.21MB |
150 Door Locks (OBJ 2.7).en.srt |
9.50KB |
150 Door Locks (OBJ 2.7).mp4 |
85.01MB |
151 |
152.35KB |
151 Demo_ Lock Picking (OBJ 2.7).en.srt |
3.58KB |
151 Demo_ Lock Picking (OBJ 2.7).mp4 |
36.73MB |
152 |
578.75KB |
152 Biometric Readers (OBJ 2.4).en.srt |
9.58KB |
152 Biometric Readers (OBJ 2.4).mp4 |
92.13MB |
153 |
1.86MB |
153 Facilities Security (OBJ 2.7).en.srt |
1.49KB |
153 Facilities Security (OBJ 2.7).mp4 |
13.93MB |
154 |
4.16KB |
154 Fire Suppression (OBJ 2.7).en.srt |
13.99KB |
154 Fire Suppression (OBJ 2.7).mp4 |
138.65MB |
155 |
568.29KB |
155 HVAC (OBJ 2.5, 2.6, & 2.7).en.srt |
5.33KB |
155 HVAC (OBJ 2.5, 2.6, & 2.7).mp4 |
53.25MB |
156 |
673.57KB |
156 Shielding (OBJ 2.7).en.srt |
5.65KB |
156 Shielding (OBJ 2.7).mp4 |
55.21MB |
157 |
1.33MB |
157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).en.srt |
4.77KB |
157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7).mp4 |
43.89MB |
158 |
1.56MB |
158 __ IoT Vulnerabilities (OBJ 2.6).en.srt |
8.66KB |
158 __ IoT Vulnerabilities (OBJ 2.6).mp4 |
29.61MB |
159 |
1.68MB |
159 __ Embedded System Vulnerabilities (OBJ 2.6).en.srt |
16.40KB |
159 __ Embedded System Vulnerabilities (OBJ 2.6).mp4 |
47.93MB |
16 |
997.80KB |
160 |
403.05KB |
160 __ ICS and SCADA Vulnerabilities (OBJ 2.6).en.srt |
18.85KB |
160 __ ICS and SCADA Vulnerabilities (OBJ 2.6).mp4 |
49.63MB |
161 |
811.26KB |
161 __ Mitigating Vulnerabilities (OBJ 2.6).en.srt |
8.39KB |
161 __ Mitigating Vulnerabilities (OBJ 2.6).mp4 |
22.23MB |
162 |
1.24MB |
162 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).en.srt |
14.92KB |
162 __ Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6).mp4 |
47.82MB |
163 |
1.60MB |
163 Authentication (OBJ 2.4, 3.5, & 3.8).en.srt |
14.81KB |
163 Authentication (OBJ 2.4, 3.5, & 3.8).mp4 |
129.73MB |
164 |
1.69MB |
164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).en.srt |
11.42KB |
164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9).mp4 |
112.74MB |
165 |
330.99KB |
165 802.1x (OBJ 3.4 & 3.8).en.srt |
7.76KB |
165 802.1x (OBJ 3.4 & 3.8).mp4 |
79.81MB |
166 |
590.14KB |
166 LDAP and Kerberos (OBJ 3.1 & 3.8).en.srt |
5.17KB |
166 LDAP and Kerberos (OBJ 3.1 & 3.8).mp4 |
53.68MB |
167 |
645.42KB |
167 Remote Desktop Services (OBJ 3.1).en.srt |
3.87KB |
167 Remote Desktop Services (OBJ 3.1).mp4 |
40.36MB |
168 |
765.14KB |
168 Remote Access Service (OBJ 3.1 & 3.8).en.srt |
4.47KB |
168 Remote Access Service (OBJ 3.1 & 3.8).mp4 |
44.42MB |
169 |
1.16MB |
169 VPN (OBJ 3.3).en.srt |
6.78KB |
169 VPN (OBJ 3.3).mp4 |
63.56MB |
17 |
1.25MB |
170 |
1.34MB |
170 RADIUS vs TACACS+ (OBJ 3.8).en.srt |
4.71KB |
170 RADIUS vs TACACS+ (OBJ 3.8).mp4 |
49.87MB |
171 |
1.56MB |
171 Authentication Summary (OBJ 3.8).en.srt |
3.81KB |
171 Authentication Summary (OBJ 3.8).mp4 |
43.71MB |
172 |
1.60MB |
172 __ Authentication Attacks (OBJ 1.2).en.srt |
17.28KB |
172 __ Authentication Attacks (OBJ 1.2).mp4 |
42.44MB |
173 |
1.62MB |
173 Access Control (OBJ 3.8).en.srt |
2.22KB |
173 Access Control (OBJ 3.8).mp4 |
18.60MB |
174 |
741.75KB |
174 Access Control Models (OBJ 3.8).en.srt |
20.82KB |
174 Access Control Models (OBJ 3.8).mp4 |
176.15MB |
175 |
875.31KB |
175 Best Practices (OBJ 2.7, 3.8, & 5.3).en.srt |
14.23KB |
175 Best Practices (OBJ 2.7, 3.8, & 5.3).mp4 |
126.18MB |
176 |
1.09MB |
176 Users and Groups (OBJ 3.7 & 3.8).en.srt |
22.02KB |
176 Users and Groups (OBJ 3.7 & 3.8).mp4 |
201.38MB |
177 |
1.30MB |
177 Permissions (OBJ 3.8).en.srt |
8.89KB |
177 Permissions (OBJ 3.8).mp4 |
81.02MB |
178 |
84.85KB |
178 Usernames and Passwords (OBJ 1.6 & 3.7).en.srt |
6.05KB |
178 Usernames and Passwords (OBJ 1.6 & 3.7).mp4 |
55.61MB |
179 |
135.65KB |
179 Demo_ Policies (OBJ 3.7).en.srt |
10.49KB |
179 Demo_ Policies (OBJ 3.7).mp4 |
32.95MB |
18 |
647.85KB |
180 |
381.01KB |
180 User Account Control (OBJ 3.7 & 3.8).en.srt |
4.57KB |
180 User Account Control (OBJ 3.7 & 3.8).mp4 |
40.83MB |
181 |
732.36KB |
181 Risk Assessments (OBJ 5.4).en.srt |
20.23KB |
181 Risk Assessments (OBJ 5.4).mp4 |
188.59MB |
182 |
1.42MB |
182 Qualitative Risk (OBJ 5.4).en.srt |
10.07KB |
182 Qualitative Risk (OBJ 5.4).mp4 |
91.50MB |
183 |
1.66MB |
183 Quantitative Risk (OBJ 5.4).en.srt |
11.69KB |
183 Quantitative Risk (OBJ 5.4).mp4 |
119.95MB |
184 |
1.68MB |
184 Methodologies (OBJ 1.7 & 5.4).en.srt |
6.52KB |
184 Methodologies (OBJ 1.7 & 5.4).mp4 |
59.43MB |
185 |
52.59KB |
185 Security Controls (OBJ 5.1).en.srt |
15.72KB |
185 Security Controls (OBJ 5.1).mp4 |
149.03MB |
186 |
69.25KB |
186 __ Types of Risk (OBJ 1.6 & 5.4).en.srt |
16.78KB |
186 __ Types of Risk (OBJ 1.6 & 5.4).mp4 |
54.76MB |
187 |
140.94KB |
187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).en.srt |
18.54KB |
187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4).mp4 |
171.62MB |
188 |
185.58KB |
188 Penetration Testing (OBJ 1.8).en.srt |
10.64KB |
188 Penetration Testing (OBJ 1.8).mp4 |
98.42MB |
189 |
259.12KB |
189 __ Training and Exercises (OBJ 1.8 & 4.2).en.srt |
11.76KB |
189 __ Training and Exercises (OBJ 1.8 & 4.2).mp4 |
32.48MB |
19 |
888.56KB |
190 |
261.39KB |
190 OVAL (OBJ 1.7).en.srt |
3.66KB |
190 OVAL (OBJ 1.7).mp4 |
32.66MB |
191 |
1.33MB |
191 Vulnerability Assessments (OBJ 1.7 & 4.1).en.srt |
15.98KB |
191 Vulnerability Assessments (OBJ 1.7 & 4.1).mp4 |
139.57MB |
192 |
1.35MB |
192 Demo_ Nmap Scanning (OBJ 4.1).en.srt |
16.11KB |
192 Demo_ Nmap Scanning (OBJ 4.1).mp4 |
97.26MB |
193 |
1.94MB |
193 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).en.srt |
20.43KB |
193 Demo_ Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3).mp4 |
96.56MB |
194 |
1.33MB |
194 Password Analysis (OBJ 1.2).en.srt |
13.77KB |
194 Password Analysis (OBJ 1.2).mp4 |
127.42MB |
195 |
1.58MB |
195 Demo_ Password Cracking (OBJ 4.1).en.srt |
5.11KB |
195 Demo_ Password Cracking (OBJ 4.1).mp4 |
39.04MB |
196 |
112.42KB |
196 Monitoring Types (OBJ 3.3).en.srt |
6.47KB |
196 Monitoring Types (OBJ 3.3).mp4 |
62.46MB |
197 |
299.99KB |
197 Performance Baselining (OBJ 2.1).en.srt |
11.00KB |
197 Performance Baselining (OBJ 2.1).mp4 |
102.38MB |
198 |
911.58KB |
198 Protocol Analyzers (OBJ 3.3 & 4.1).en.srt |
6.75KB |
198 Protocol Analyzers (OBJ 3.3 & 4.1).mp4 |
64.92MB |
199 |
1.02MB |
199 SNMP (OBJ 3.1).en.srt |
8.04KB |
199 SNMP (OBJ 3.1).mp4 |
79.36MB |
2 |
1.39MB |
20 |
1.50MB |
200 |
1.30MB |
200 Demo_ Analytical Tools (OBJ 4.1).en.srt |
9.77KB |
200 Demo_ Analytical Tools (OBJ 4.1).mp4 |
48.58MB |
201 |
1.36MB |
201 Auditing (OBJ 1.7).en.srt |
4.48KB |
201 Auditing (OBJ 1.7).mp4 |
42.70MB |
202 |
1.39MB |
202 Demo_ Auditing Files (OBJ 1.7).en.srt |
8.07KB |
202 Demo_ Auditing Files (OBJ 1.7).mp4 |
52.84MB |
203 |
1.40MB |
203 Logging (OBJ 1.7, 4.3, & 4.5).en.srt |
8.28KB |
203 Logging (OBJ 1.7, 4.3, & 4.5).mp4 |
79.54MB |
204 |
1.51MB |
204 Log Files (OBJ 4.3).en.srt |
11.74KB |
204 Log Files (OBJ 4.3).mp4 |
114.82MB |
205 |
1.56MB |
205 SIEM (OBJ 1.7 & 4.3).en.srt |
19.92KB |
205 SIEM (OBJ 1.7 & 4.3).mp4 |
65.87MB |
206 |
1.85MB |
206 __ Syslog (OBJ 1.7 & 4.3).en.srt |
12.91KB |
206 __ Syslog (OBJ 1.7 & 4.3).mp4 |
42.49MB |
207 |
393.09KB |
207 __ SOAR (OBJ 1.7 & 4.4).en.srt |
7.88KB |
207 __ SOAR (OBJ 1.7 & 4.4).mp4 |
21.26MB |
208 |
651.64KB |
208 Cryptography (OBJ 2.1 & 2.8).en.srt |
12.10KB |
208 Cryptography (OBJ 2.1 & 2.8).mp4 |
107.94MB |
209 |
752.26KB |
209 Symmetric vs Asymmetric (OBJ 2.8).en.srt |
13.28KB |
209 Symmetric vs Asymmetric (OBJ 2.8).mp4 |
134.00MB |
21 |
544.99KB |
210 |
1.04MB |
210 Symmetric Algorithms (OBJ 2.8).en.srt |
10.20KB |
210 Symmetric Algorithms (OBJ 2.8).mp4 |
103.40MB |
211 |
1.17MB |
211 Public Key Cryptography (OBJ 2.8).en.srt |
7.16KB |
211 Public Key Cryptography (OBJ 2.8).mp4 |
52.38MB |
212 |
1.38MB |
212 Asymmetric Algorithms (OBJ 2.8).en.srt |
7.79KB |
212 Asymmetric Algorithms (OBJ 2.8).mp4 |
81.35MB |
213 |
1.41MB |
213 Pretty Good Privacy (OBJ 2.8).en.srt |
3.38KB |
213 Pretty Good Privacy (OBJ 2.8).mp4 |
38.63MB |
214 |
1.64MB |
214 Key Management (OBJ 2.8).en.srt |
5.45KB |
214 Key Management (OBJ 2.8).mp4 |
47.95MB |
215 |
1.90MB |
215 One-Time Pad (OBJ 2.8).en.srt |
9.73KB |
215 One-Time Pad (OBJ 2.8).mp4 |
94.51MB |
216 |
286.95KB |
216 Demo_ Steganography (OBJ 2.8).en.srt |
8.45KB |
216 Demo_ Steganography (OBJ 2.8).mp4 |
42.15MB |
217 |
472.22KB |
217 __ Cryptography Considerations (OBJ 2.8).en.srt |
28.82KB |
217 __ Cryptography Considerations (OBJ 2.8).mp4 |
76.61MB |
218 |
686.88KB |
218 Hashing (OBJ 1.2, 2.8 & 3.2).en.srt |
17.03KB |
218 Hashing (OBJ 1.2, 2.8 & 3.2).mp4 |
166.15MB |
219 |
944.66KB |
219 Demo_ Hashing (OBJ 2.8).en.srt |
5.86KB |
219 Demo_ Hashing (OBJ 2.8).mp4 |
38.54MB |
22 |
700.19KB |
220 |
987.39KB |
220 Hashing Attacks (OBJ 1.2,1.3, & 2.8).en.srt |
7.31KB |
220 Hashing Attacks (OBJ 1.2,1.3, & 2.8).mp4 |
70.64MB |
221 |
1.28MB |
221 Increasing Hash Security (OBJ 2.8 & 3.7).en.srt |
3.40KB |
221 Increasing Hash Security (OBJ 2.8 & 3.7).mp4 |
31.97MB |
222 |
1.37MB |
222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).en.srt |
7.98KB |
222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9).mp4 |
51.15MB |
223 |
1.39MB |
223 Digital Certificates (OBJ 3.9).en.srt |
15.76KB |
223 Digital Certificates (OBJ 3.9).mp4 |
144.50MB |
224 |
1.39MB |
224 Demo_ Certificates (OBJ 2.8 & 3.9).en.srt |
7.09KB |
224 Demo_ Certificates (OBJ 2.8 & 3.9).mp4 |
27.99MB |
225 |
1.46MB |
225 Certificate Authorities (OBJ 3.2 & 3.9).en.srt |
9.32KB |
225 Certificate Authorities (OBJ 3.2 & 3.9).mp4 |
89.81MB |
226 |
1.66MB |
226 Web of Trust (OBJ 3.9).en.srt |
6.32KB |
226 Web of Trust (OBJ 3.9).mp4 |
57.34MB |
227 |
1.85MB |
227 Security Protocols (OBJ 3.1).en.srt |
879B |
227 Security Protocols (OBJ 3.1).mp4 |
8.70MB |
228 |
1.27MB |
228 S_MIME (OBJ 3.1).en.srt |
3.33KB |
228 S_MIME (OBJ 3.1).mp4 |
33.00MB |
229 |
662.72KB |
229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).en.srt |
12.40KB |
229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3).mp4 |
121.66MB |
23 |
444.67KB |
230 |
976.98KB |
230 SSH (OBJ 3.1 & 4.1).en.srt |
5.74KB |
230 SSH (OBJ 3.1 & 4.1).mp4 |
54.40MB |
231 |
1.41MB |
231 VPN Protocols (OBJ 3.1 & 3..3).en.srt |
14.48KB |
231 VPN Protocols (OBJ 3.1 & 3..3).mp4 |
141.32MB |
232 |
78.55KB |
232 Demo_ Setting up a VPN (OBJ 3.3).en.srt |
3.38KB |
232 Demo_ Setting up a VPN (OBJ 3.3).mp4 |
24.77MB |
233 |
280.13KB |
233 Planning for the Worst (OBJ 2.5 & 5.4).en.srt |
5.10KB |
233 Planning for the Worst (OBJ 2.5 & 5.4).mp4 |
47.74MB |
234 |
463.33KB |
234 Redundant Power (OBJ 2.5).en.srt |
7.36KB |
234 Redundant Power (OBJ 2.5).mp4 |
68.69MB |
235 |
906.95KB |
235 Backup Power (OBJ 2.5).en.srt |
7.66KB |
235 Backup Power (OBJ 2.5).mp4 |
68.99MB |
236 |
1019.23KB |
236 Data Redundancy (OBJ 2.5).en.srt |
10.11KB |
236 Data Redundancy (OBJ 2.5).mp4 |
100.31MB |
237 |
1023.66KB |
237 Demo_ RAIDs (OBJ 2.5).en.srt |
8.08KB |
237 Demo_ RAIDs (OBJ 2.5).mp4 |
39.33MB |
238 |
1.05MB |
238 Network Redundancy (OBJ 2.5).en.srt |
5.07KB |
238 Network Redundancy (OBJ 2.5).mp4 |
46.67MB |
239 |
1.34MB |
239 Server Redundancy (OBJ 2.5 &3.3).en.srt |
3.94KB |
239 Server Redundancy (OBJ 2.5 &3.3).mp4 |
38.34MB |
24 |
522.85KB |
240 |
1.43MB |
240 Redundant Sites (OBJ 2.1).en.srt |
5.76KB |
240 Redundant Sites (OBJ 2.1).mp4 |
50.70MB |
241 |
1.52MB |
241 Data Backup (OBJ 2.5).en.srt |
6.57KB |
241 Data Backup (OBJ 2.5).mp4 |
62.71MB |
242 |
1.98MB |
242 Tape Rotation (OBJ 2.5).en.srt |
8.96KB |
242 Tape Rotation (OBJ 2.5).mp4 |
85.12MB |
243 |
27.83KB |
243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).en.srt |
14.21KB |
243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4).mp4 |
123.19MB |
244 |
383.21KB |
244 __ Business Impact Analysis (OBJ 5.4).en.srt |
36.80KB |
244 __ Business Impact Analysis (OBJ 5.4).mp4 |
118.33MB |
245 |
631.41KB |
245 Social Engineering (OBJ 1.1).en.srt |
2.06KB |
245 Social Engineering (OBJ 1.1).mp4 |
19.74MB |
246 |
957.74KB |
246 Demo_ Pretexting (OBJ 1.1 & 5.3).en.srt |
11.88KB |
246 Demo_ Pretexting (OBJ 1.1 & 5.3).mp4 |
94.00MB |
247 |
1.11MB |
247 Insider Threat (OBJ 1.5).en.srt |
5.23KB |
247 Insider Threat (OBJ 1.5).mp4 |
48.34MB |
248 |
1.31MB |
248 Phishing (OBJ 1.1 & 5.3).en.srt |
14.83KB |
248 Phishing (OBJ 1.1 & 5.3).mp4 |
135.84MB |
249 |
191.98KB |
249 __ Motivation Factors (OBJ 1.1).en.srt |
17.44KB |
249 __ Motivation Factors (OBJ 1.1).mp4 |
159.04MB |
25 |
1.35MB |
250 |
394.84KB |
250 More Social Engineering (OBJ 1.1 & 1.2).en.srt |
9.45KB |
250 More Social Engineering (OBJ 1.1 & 1.2).mp4 |
88.13MB |
251 |
411.03KB |
251 __ Fraud and Scams (OBJ 1.1).en.srt |
12.45KB |
251 __ Fraud and Scams (OBJ 1.1).mp4 |
42.61MB |
252 |
1.07MB |
252 __ Influence Campaigns (OBJ 1.1).en.srt |
9.55KB |
252 __ Influence Campaigns (OBJ 1.1).mp4 |
40.10MB |
253 |
1.47MB |
253 User Education (OBJ 5.3).en.srt |
10.80KB |
253 User Education (OBJ 5.3).mp4 |
105.26MB |
254 |
1.56MB |
254 Policies and Procedures (OBJ 5.2 & 5.3).en.srt |
13.36KB |
254 Policies and Procedures (OBJ 5.2 & 5.3).mp4 |
126.68MB |
255 |
12.94KB |
255 Data Classifications (OBJ 5.3 & 5.5).en.srt |
16.38KB |
255 Data Classifications (OBJ 5.3 & 5.5).mp4 |
145.37MB |
256 |
1.14MB |
256 __ Data Ownership.en.srt |
9.23KB |
256 __ Data Ownership.mp4 |
24.59MB |
257 |
1.23MB |
257 PII and PHI (OBJ 5.2 & 5.5).en.srt |
13.77KB |
257 PII and PHI (OBJ 5.2 & 5.5).mp4 |
134.04MB |
258 |
1.41MB |
258 __ Legal Requirements (OBJ 5.2 & 5.5).en.srt |
13.53KB |
258 __ Legal Requirements (OBJ 5.2 & 5.5).mp4 |
41.27MB |
259 |
1.49MB |
259 __ Privacy Technologies (OBJ 5.5).en.srt |
15.48KB |
259 __ Privacy Technologies (OBJ 5.5).mp4 |
38.15MB |
26 |
1.04MB |
260 |
1.89MB |
260 Security Policies (OBJ 5.3 & 5.5).en.srt |
25.45KB |
260 Security Policies (OBJ 5.3 & 5.5).mp4 |
225.33MB |
261 |
1.11MB |
261 User Education (OBJ 5.3).en.srt |
9.87KB |
261 User Education (OBJ 5.3).mp4 |
88.88MB |
262 |
1.77MB |
262 Vendor Relationships (OBJ 5.3).en.srt |
18.59KB |
262 Vendor Relationships (OBJ 5.3).mp4 |
167.16MB |
263 |
762.14KB |
263 Disposal Policies (OBJ 2.7 & 4.1).en.srt |
12.91KB |
263 Disposal Policies (OBJ 2.7 & 4.1).mp4 |
110.05MB |
264 |
264.86KB |
264 IT Security Frameworks (OBJ 5.2).en.srt |
7.51KB |
264 IT Security Frameworks (OBJ 5.2).mp4 |
71.12MB |
265 |
737.06KB |
265 __ Key Frameworks (OBJ 5.2).en.srt |
18.86KB |
265 __ Key Frameworks (OBJ 5.2).mp4 |
77.23MB |
266 |
1.40MB |
266 Incident Response Procedures (OBJ 4.2).en.srt |
11.28KB |
266 Incident Response Procedures (OBJ 4.2).mp4 |
99.10MB |
267 |
1.43MB |
267 __ Incident Response Planning (OBJ 4.2).en.srt |
43.77KB |
267 __ Incident Response Planning (OBJ 4.2).mp4 |
113.29MB |
268 |
211.42KB |
268 __ Investigative Data (OBJ 4.3).en.srt |
29.59KB |
268 __ Investigative Data (OBJ 4.3).mp4 |
74.72MB |
269 |
1.40MB |
269 __ Forensic Procedures (OBJ 4.5).en.srt |
33.95KB |
269 __ Forensic Procedures (OBJ 4.5).mp4 |
82.94MB |
27 |
1.36MB |
270 |
1012.30KB |
270 Data Collection Procedures (OBJ 4.1 & 4.5).en.srt |
19.67KB |
270 Data Collection Procedures (OBJ 4.1 & 4.5).mp4 |
101.16MB |
271 |
1.47MB |
271 Demo_ Disk Imaging (OBJ 4.1).en.srt |
14.25KB |
271 Demo_ Disk Imaging (OBJ 4.1).mp4 |
63.03MB |
272 |
68.99KB |
272 __ Security Tools (OBJ 4.1).en.srt |
49.79KB |
272 __ Security Tools (OBJ 4.1).mp4 |
134.28MB |
273 |
1.24MB |
273 Conclusion.en.srt |
23.11KB |
273 Conclusion.mp4 |
212.10MB |
274 BONUS_ What's Next_.en.srt |
9.18KB |
274 BONUS_ What's Next_.mp4 |
76.89MB |
28 |
168.62KB |
29 |
366.36KB |
3 |
634.15KB |
30 |
1.34MB |
31 |
1.72MB |
32 |
1.96MB |
33 |
1.16KB |
34 |
1.80MB |
35 |
1.31MB |
36 |
271.75KB |
37 |
1.16MB |
38 |
1.49MB |
39 |
593.43KB |
4 |
64.47KB |
40 |
1.32MB |
41 |
1.82MB |
42 |
827.69KB |
43 |
343.51KB |
44 |
1.71MB |
45 |
54.61KB |
46 |
1.67MB |
47 |
1.18MB |
48 |
722.12KB |
49 |
1.26MB |
5 |
1.24MB |
50 |
1.95MB |
51 |
588.88KB |
52 |
1.71MB |
53 |
57.90KB |
54 |
376.39KB |
55 |
1.27MB |
56 |
234.08KB |
57 |
762.61KB |
58 |
1.11MB |
59 |
615.11KB |
6 |
1.41MB |
60 |
705.34KB |
61 |
1.62MB |
62 |
249.18KB |
63 |
526.14KB |
64 |
863.73KB |
65 |
1.69MB |
66 |
469.31KB |
67 |
920.29KB |
68 |
1.58MB |
69 |
760.12KB |
7 |
1.85MB |
70 |
1017.00KB |
71 |
1.12MB |
72 |
1.44MB |
73 |
1.77MB |
74 |
302.44KB |
75 |
1.49MB |
76 |
3.58KB |
77 |
846.36KB |
78 |
1.63MB |
79 |
1.87MB |
8 |
728.58KB |
80 |
330.76KB |
81 |
452.31KB |
82 |
509.45KB |
83 |
518.96KB |
84 |
578.80KB |
85 |
605.94KB |
86 |
611.88KB |
87 |
198.34KB |
88 |
1.12MB |
89 |
1.87MB |
9 |
390.33KB |
90 |
324.82KB |
91 |
1.31MB |
92 |
1.83MB |
93 |
900.25KB |
94 |
1014.46KB |
95 |
1.91MB |
96 |
584.75KB |
97 |
1.06MB |
98 |
1.56MB |
99 |
162.64KB |
external-assets-links.txt |
157B |
TutsNode.com.txt |
63B |