Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
139B |
1 |
350.21KB |
1. Attention for Ethical Hackers.html |
448B |
1. Basic Terminologies and Concepts.mp4 |
19.85MB |
1. Basic Terminologies and Concepts.srt |
5.41KB |
1. Characteristics of Cloud Computing.mp4 |
148.34MB |
1. Characteristics of Cloud Computing.srt |
10.78KB |
1. Command Parameters.mp4 |
15.56MB |
1. Command Parameters.srt |
2.51KB |
1. CompTIA A+ Certification Lab CompTIA A+ 220-1101, 220-1102.html |
266B |
1. CompTIA A+ Course Introduction.mp4 |
5.87MB |
1. CompTIA A+ Course Introduction.srt |
1.55KB |
1. CPU.mp4 |
47.85MB |
1. CPU.srt |
3.47KB |
1. Ethernet.mp4 |
12.51MB |
1. Ethernet.srt |
2.42KB |
1. Functions Of Operating Systems.mp4 |
168.61MB |
1. Functions Of Operating Systems.srt |
14.40KB |
1. History of Computer.mp4 |
29.18MB |
1. History of Computer.srt |
1.85KB |
1. Input Processing - Output Cycle.mp4 |
103.96MB |
1. Input Processing - Output Cycle.srt |
8.45KB |
1. Introduction to Users and Groups.mp4 |
8.02MB |
1. Introduction to Users and Groups.srt |
3.41KB |
1. Primary and Secondary Memory.mp4 |
69.64MB |
1. Primary and Secondary Memory.srt |
4.84KB |
1. Programming Languages.mp4 |
73.42MB |
1. Programming Languages.srt |
6.88KB |
1. Slow System Performance.mp4 |
8.56MB |
1. Slow System Performance.srt |
2.43KB |
1. Terminologies Part 1.mp4 |
46.26MB |
1. Terminologies Part 1.srt |
6.93KB |
1. Troubleshooting Methodology.mp4 |
13.48MB |
1. Troubleshooting Methodology.srt |
4.18KB |
1. View the File with more Command.mp4 |
20.12MB |
1. View the File with more Command.srt |
2.19KB |
1. What is a Library - 1.mp4 |
84.93MB |
1. What is a Library - 1.srt |
5.17KB |
1. What is database.mp4 |
13.25MB |
1. What is database.srt |
3.91KB |
1. What is IoT.mp4 |
62.32MB |
1. What is IoT.srt |
4.46KB |
1. What is Linux.mp4 |
5.51MB |
1. What is Linux.srt |
1.80KB |
1. What is Monitor.mp4 |
16.87MB |
1. What is Monitor.srt |
4.23KB |
1. What is Security.mp4 |
18.05MB |
1. What is Security.srt |
2.93KB |
10 |
672.30KB |
10. Create File & Modify Date - touch Command.mp4 |
8.63MB |
10. Create File & Modify Date - touch Command.srt |
1.18KB |
10. iOS.mp4 |
5.37MB |
10. iOS.srt |
1.57KB |
10. Layer 2 ARP - Address Resolution Protocol.mp4 |
74.00MB |
10. Layer 2 ARP - Address Resolution Protocol.srt |
7.70KB |
10. MSTSC.mp4 |
9.01MB |
10. MSTSC.srt |
1.68KB |
10. What are DoS and DDoS Attacks.mp4 |
14.61MB |
10. What are DoS and DDoS Attacks.srt |
3.59KB |
100 |
450.87KB |
101 |
588.42KB |
102 |
687.82KB |
103 |
804.83KB |
104 |
954.60KB |
105 |
1001.98KB |
106 |
1019.19KB |
107 |
37.38KB |
108 |
227.68KB |
109 |
250.32KB |
11 |
627.28KB |
11. Chrome OS.mp4 |
6.07MB |
11. Chrome OS.srt |
1.33KB |
11. Layer 2 Analysing ARP Packets.mp4 |
36.35MB |
11. Layer 2 Analysing ARP Packets.srt |
3.86KB |
11. Malware Types.mp4 |
8.35MB |
11. Malware Types.srt |
2.19KB |
11. Remove Files or Directories - rm Command.mp4 |
12.41MB |
11. Remove Files or Directories - rm Command.srt |
2.45KB |
110 |
401.28KB |
111 |
533.50KB |
112 |
595.57KB |
113 |
598.18KB |
114 |
617.59KB |
115 |
680.62KB |
116 |
718.39KB |
117 |
801.01KB |
118 |
862.87KB |
119 |
105.26KB |
12 |
40.81KB |
12. Copy and Move Files or Directories - cp & mv Command.mp4 |
12.94MB |
12. Copy and Move Files or Directories - cp & mv Command.srt |
2.07KB |
12. Layer 2 VLANs (Virtual Local Area Networks).mp4 |
25.35MB |
12. Layer 2 VLANs (Virtual Local Area Networks).srt |
4.89KB |
120 |
182.23KB |
121 |
404.17KB |
122 |
535.32KB |
123 |
651.21KB |
124 |
765.12KB |
125 |
787.18KB |
126 |
971.25KB |
127 |
59.33KB |
128 |
203.42KB |
129 |
205.81KB |
13 |
35.21KB |
13. Find Files and Directories - find Command.mp4 |
17.28MB |
13. Find Files and Directories - find Command.srt |
3.06KB |
13. Layer 2 WLANs (Wireless Local Area Networks).mp4 |
28.88MB |
13. Layer 2 WLANs (Wireless Local Area Networks).srt |
8.14KB |
130 |
500.86KB |
131 |
602.62KB |
132 |
738.66KB |
133 |
987.06KB |
134 |
997.67KB |
135 |
182.31KB |
136 |
187.66KB |
137 |
294.40KB |
138 |
307.60KB |
139 |
380.64KB |
14 |
289.30KB |
14. Cut Parts of Lines - cut Command.mp4 |
24.65MB |
14. Cut Parts of Lines - cut Command.srt |
2.24KB |
14. Layer 3 - Network Layer.mp4 |
8.50MB |
14. Layer 3 - Network Layer.srt |
1.96KB |
140 |
782.25KB |
141 |
803.90KB |
142 |
171.60KB |
143 |
401.33KB |
144 |
615.65KB |
145 |
729.85KB |
146 |
807.83KB |
147 |
837.52KB |
148 |
965.94KB |
149 |
239.03KB |
15 |
1008.28KB |
15. Change Ownership of a Given File - chown Command.mp4 |
9.44MB |
15. Change Ownership of a Given File - chown Command.srt |
2.02KB |
15. Layer 3 IP (Internet Protocol).mp4 |
11.24MB |
15. Layer 3 IP (Internet Protocol).srt |
3.04KB |
150 |
240.05KB |
151 |
578.23KB |
152 |
850.81KB |
153 |
911.84KB |
154 |
913.23KB |
155 |
968.15KB |
156 |
1015.96KB |
157 |
16.43KB |
158 |
139.18KB |
159 |
225.74KB |
16 |
75.76KB |
16. Layer 3 IPv4 Addressing System.mp4 |
7.06MB |
16. Layer 3 IPv4 Addressing System.srt |
2.20KB |
160 |
381.43KB |
161 |
445.57KB |
162 |
458.83KB |
163 |
514.22KB |
164 |
669.83KB |
165 |
860.23KB |
166 |
1003.98KB |
167 |
14.43KB |
168 |
70.93KB |
169 |
173.04KB |
17 |
548.16KB |
17. Layer 3 IPv4 Packet Header.mp4 |
14.30MB |
17. Layer 3 IPv4 Packet Header.srt |
3.58KB |
170 |
576.35KB |
171 |
583.76KB |
172 |
681.48KB |
173 |
776.95KB |
174 |
833.90KB |
175 |
951.86KB |
176 |
959.03KB |
177 |
959.24KB |
178 |
51.06KB |
179 |
86.32KB |
18 |
483.25KB |
18. Layer 3 Subnetting - Classful Networks.mp4 |
9.11MB |
18. Layer 3 Subnetting - Classful Networks.srt |
2.71KB |
180 |
385.29KB |
181 |
576.22KB |
182 |
955.82KB |
183 |
131.58KB |
184 |
152.16KB |
185 |
172.70KB |
186 |
216.14KB |
187 |
337.10KB |
188 |
410.96KB |
189 |
502.86KB |
19 |
347.54KB |
19. Layer 3 Subnetting Masks.mp4 |
16.10MB |
19. Layer 3 Subnetting Masks.srt |
2.97KB |
190 |
646.83KB |
191 |
684.55KB |
192 |
753.85KB |
193 |
758.12KB |
194 |
145.48KB |
195 |
596.43KB |
196 |
675.86KB |
197 |
460.71KB |
2 |
983.01KB |
2. Common Symptoms of Malware Infections.mp4 |
14.76MB |
2. Common Symptoms of Malware Infections.srt |
3.35KB |
2. Computer Inputs.mp4 |
16.06MB |
2. Computer Inputs.srt |
1.12KB |
2. Content of the Network Fundamentals.mp4 |
11.82MB |
2. Content of the Network Fundamentals.srt |
1.61KB |
2. Distributions.mp4 |
6.62MB |
2. Distributions.srt |
1.50KB |
2. FAQ About CompTIA A+ Certification Lab CompTIA A+ 220-1101, 220-1102.html |
8.37KB |
2. Fiber.mp4 |
10.61MB |
2. Fiber.srt |
2.78KB |
2. GPU.mp4 |
44.45MB |
2. GPU.srt |
2.96KB |
2. Kinds of Operating System.mp4 |
28.20MB |
2. Kinds of Operating System.srt |
1.86KB |
2. List Files - ls Command.mp4 |
36.79MB |
2. List Files - ls Command.srt |
3.60KB |
2. Managing Users and Groups.mp4 |
5.26MB |
2. Managing Users and Groups.srt |
1.63KB |
2. Privacy-Integrity-Availability.mp4 |
15.33MB |
2. Privacy-Integrity-Availability.srt |
4.22KB |
2. RAM.mp4 |
21.55MB |
2. RAM.srt |
1.78KB |
2. RDBMS(Relational Database Management System).mp4 |
10.18MB |
2. RDBMS(Relational Database Management System).srt |
2.54KB |
2. System Lockups.mp4 |
10.06MB |
2. System Lockups.srt |
3.56KB |
2. Terminologies Part 2.mp4 |
24.61MB |
2. Terminologies Part 2.srt |
7.82KB |
2. Types of Programming.mp4 |
151.32MB |
2. Types of Programming.srt |
10.16KB |
2. View the File with less Command.mp4 |
14.22MB |
2. View the File with less Command.srt |
1.51KB |
2. What is a Computer.mp4 |
23.43MB |
2. What is a Computer.srt |
1.70KB |
2. What is Cloud Computing.mp4 |
58.02MB |
2. What is Cloud Computing.srt |
4.23KB |
2. What is Printer.mp4 |
5.26MB |
2. What is Printer.srt |
2.47KB |
2. What is Virtualization.mp4 |
18.03MB |
2. What is Virtualization.srt |
1.13KB |
2. Where does IoT Exist in Our Lives.mp4 |
31.91MB |
2. Where does IoT Exist in Our Lives.srt |
2.47KB |
2. Wireless Operating Modes.mp4 |
39.78MB |
2. Wireless Operating Modes.srt |
7.04KB |
20 |
3.13KB |
20. Layer 3 Understanding IPv4 Subnets.mp4 |
25.01MB |
20. Layer 3 Understanding IPv4 Subnets.srt |
3.30KB |
21 |
589.40KB |
21. Layer 3 IPv4 Address Shortage.mp4 |
15.02MB |
21. Layer 3 IPv4 Address Shortage.srt |
2.29KB |
22 |
776.66KB |
22. Layer 3 Private Networks.mp4 |
17.93MB |
22. Layer 3 Private Networks.srt |
4.75KB |
23 |
365.99KB |
23. Layer 3 Private Networks - Demonstration.mp4 |
13.36MB |
23. Layer 3 Private Networks - Demonstration.srt |
3.28KB |
24 |
387.99KB |
24. Layer 3 NAT (Network Address Translation).mp4 |
29.39MB |
24. Layer 3 NAT (Network Address Translation).srt |
5.42KB |
25 |
696.90KB |
25. Layer 3 IPv6, Packet Header & Addressing.mp4 |
29.26MB |
25. Layer 3 IPv6, Packet Header & Addressing.srt |
9.88KB |
26 |
1005.38KB |
26. Layer 3 DHCP - How the Mechanism Works.mp4 |
75.53MB |
26. Layer 3 DHCP - How the Mechanism Works.srt |
10.99KB |
27 |
48.87KB |
27. Layer 3 ICMP (Internet Control Message Protocol).mp4 |
7.07MB |
27. Layer 3 ICMP (Internet Control Message Protocol).srt |
2.47KB |
28 |
397.37KB |
28. Layer 3 Traceroute.mp4 |
88.72MB |
28. Layer 3 Traceroute.srt |
11.03KB |
29 |
732.31KB |
29. Layer 4 - Transport Layer.mp4 |
10.21MB |
29. Layer 4 - Transport Layer.srt |
3.35KB |
3 |
700.63KB |
3. 32-Bit vs. 64-Bit File Systems.mp4 |
18.78MB |
3. 32-Bit vs. 64-Bit File Systems.srt |
3.72KB |
3. Basic Terms of Networking.mp4 |
33.86MB |
3. Basic Terms of Networking.srt |
6.57KB |
3. Benefits of Using Computer.mp4 |
10.29MB |
3. Benefits of Using Computer.srt |
922B |
3. Cloud Service Modules - 1.mp4 |
121.90MB |
3. Cloud Service Modules - 1.srt |
8.70KB |
3. Encryption and Access Control.mp4 |
13.05MB |
3. Encryption and Access Control.srt |
3.49KB |
3. How does IoT work.mp4 |
13.61MB |
3. How does IoT work.srt |
1.09KB |
3. macOS Boot Errors.mp4 |
7.99MB |
3. macOS Boot Errors.srt |
2.37KB |
3. Motherboard.mp4 |
20.85MB |
3. Motherboard.srt |
1.43KB |
3. NTFS Permissions.mp4 |
12.03MB |
3. NTFS Permissions.srt |
2.01KB |
3. Pieces of Linux.mp4 |
11.63MB |
3. Pieces of Linux.srt |
3.35KB |
3. Print First Lines with head Command.mp4 |
7.19MB |
3. Print First Lines with head Command.srt |
1.32KB |
3. Print Working Directory - pwd Command.mp4 |
5.79MB |
3. Print Working Directory - pwd Command.srt |
936B |
3. Sending Fake Emails - Phishing.mp4 |
7.93MB |
3. Sending Fake Emails - Phishing.srt |
1.54KB |
3. SRAM and DRAM.mp4 |
23.62MB |
3. SRAM and DRAM.srt |
1.47KB |
3. Troubleshooting Internet Connections.mp4 |
18.27MB |
3. Troubleshooting Internet Connections.srt |
4.58KB |
3. Types of Virtualization.mp4 |
26.97MB |
3. Types of Virtualization.srt |
1.90KB |
3. VGA.mp4 |
16.41MB |
3. VGA.srt |
2.21KB |
3. What are Headphones.mp4 |
15.07MB |
3. What are Headphones.srt |
3.65KB |
3. What is Processing.mp4 |
21.68MB |
3. What is Processing.srt |
1.49KB |
3. What is SQLQuery.mp4 |
12.04MB |
3. What is SQLQuery.srt |
3.19KB |
3. What is the CompTIA A+.mp4 |
6.44MB |
3. What is the CompTIA A+.srt |
1.63KB |
3. Wireless Packet Types.mp4 |
13.82MB |
3. Wireless Packet Types.srt |
6.42KB |
30 |
156.49KB |
30. Layer 4 TCP (Transmission Control Protocol).mp4 |
40.43MB |
30. Layer 4 TCP (Transmission Control Protocol).srt |
8.51KB |
31 |
759.50KB |
31. Layer 4 TCP Header.mp4 |
9.05MB |
31. Layer 4 TCP Header.srt |
2.94KB |
32 |
721.15KB |
32. Layer 4 UDP (User Datagram Protocol).mp4 |
17.18MB |
32. Layer 4 UDP (User Datagram Protocol).srt |
4.69KB |
33 |
562.92KB |
33. Layer 5-7 - Application Layer.mp4 |
3.55MB |
33. Layer 5-7 - Application Layer.srt |
1.16KB |
34 |
582.85KB |
34. Layer 7 DNS (Domain Name System).mp4 |
27.91MB |
34. Layer 7 DNS (Domain Name System).srt |
6.98KB |
35 |
912.00KB |
35. Layer 7 HTTP (Hyper Text Transfer Protocol).mp4 |
15.43MB |
35. Layer 7 HTTP (Hyper Text Transfer Protocol).srt |
3.69KB |
36 |
648.32KB |
36. Layer 7 HTTPS.mp4 |
7.06MB |
36. Layer 7 HTTPS.srt |
2.28KB |
37 |
905.89KB |
37. GNS3 - Graphical Network Simulator.mp4 |
42.37MB |
37. GNS3 - Graphical Network Simulator.srt |
4.05KB |
38 |
436.74KB |
38. GNS3 Setting Up the First Project.mp4 |
108.34MB |
38. GNS3 Setting Up the First Project.srt |
9.86KB |
39 |
578.95KB |
39. GNS3 Tool Components.mp4 |
40.01MB |
39. GNS3 Tool Components.srt |
3.58KB |
4 |
497.99KB |
4. A Rule (Authentication, Authorization and Accounting).mp4 |
15.21MB |
4. A Rule (Authentication, Authorization and Accounting).srt |
5.29KB |
4. Check the Wi-Fi Settings.mp4 |
5.83MB |
4. Check the Wi-Fi Settings.srt |
1.41KB |
4. Cloud Service Modules - 2.mp4 |
104.39MB |
4. Cloud Service Modules - 2.srt |
7.56KB |
4. Connection Standarts.mp4 |
149.51MB |
4. Connection Standarts.srt |
12.05KB |
4. Cyber Attacks to CPU.mp4 |
17.49MB |
4. Cyber Attacks to CPU.srt |
1.09KB |
4. FAT32.mp4 |
6.92MB |
4. FAT32.srt |
1.69KB |
4. File Explorer.mp4 |
8.86MB |
4. File Explorer.srt |
1.76KB |
4. Functions of Virtualization.mp4 |
15.00MB |
4. Functions of Virtualization.srt |
1.22KB |
4. HDMI.mp4 |
7.33MB |
4. HDMI.srt |
2.02KB |
4. How Can We Get CompTIA A+.mp4 |
7.83MB |
4. How Can We Get CompTIA A+.srt |
2.13KB |
4. Install MS SQL Server Express Edition 2019.mp4 |
42.12MB |
4. Install MS SQL Server Express Edition 2019.srt |
5.23KB |
4. Output Devices.mp4 |
11.70MB |
4. Output Devices.srt |
711B |
4. Print Last Lines with tail Command.mp4 |
10.83MB |
4. Print Last Lines with tail Command.srt |
1.61KB |
4. Reference Models.mp4 |
1.66MB |
4. Reference Models.srt |
489B |
4. ROM.mp4 |
20.12MB |
4. ROM.srt |
1.45KB |
4. Shell.mp4 |
14.34MB |
4. Shell.srt |
2.32KB |
4. Show Manuel - man Command.mp4 |
19.52MB |
4. Show Manuel - man Command.srt |
2.50KB |
4. Types of Computer.mp4 |
18.00MB |
4. Types of Computer.srt |
1.38KB |
4. Vishing - Voice Phishing.mp4 |
14.78MB |
4. Vishing - Voice Phishing.srt |
4.94KB |
4. What is Computer Speaker.mp4 |
5.85MB |
4. What is Computer Speaker.srt |
2.07KB |
4. Windows Boot Errors.mp4 |
12.80MB |
4. Windows Boot Errors.srt |
2.94KB |
4. Wireshark Analysing Packet Types.mp4 |
99.97MB |
4. Wireshark Analysing Packet Types.srt |
6.67KB |
40 |
1012.73KB |
40. GNS3 Building the Network.mp4 |
115.61MB |
40. GNS3 Building the Network.srt |
17.47KB |
41 |
221.89KB |
41. GNS3 Attaching VMware VMs (Including Kali) to the Network.mp4 |
49.28MB |
41. GNS3 Attaching VMware VMs (Including Kali) to the Network.srt |
7.77KB |
42 |
214.28KB |
42. GNS3 Configuring Switch & Router (Cisco) and creating VLANs.mp4 |
50.61MB |
42. GNS3 Configuring Switch & Router (Cisco) and creating VLANs.srt |
6.07KB |
43 |
661.93KB |
43. Active Network Devices Router, Switch, Hub.mp4 |
28.83MB |
43. Active Network Devices Router, Switch, Hub.srt |
5.80KB |
44 |
510.97KB |
44. Wireless Access Point(WAP).mp4 |
17.16MB |
44. Wireless Access Point(WAP).srt |
1.51KB |
45 |
142.75KB |
45. Summary of Network Fundamentals.mp4 |
5.33MB |
45. Summary of Network Fundamentals.srt |
1.51KB |
46 |
88.28KB |
47 |
106.85KB |
48 |
697.25KB |
49 |
315.52KB |
5 |
678.07KB |
5. 10 Reasons Why You Should Get CompTIA A+ Certified.html |
4.84KB |
5. Change Directory - cd Command.mp4 |
11.82MB |
5. Change Directory - cd Command.srt |
2.64KB |
5. DisplayPort.mp4 |
11.21MB |
5. DisplayPort.srt |
2.02KB |
5. FAT64.mp4 |
9.11MB |
5. FAT64.srt |
2.76KB |
5. Global Regular Expression Print - grep Command.mp4 |
23.82MB |
5. Global Regular Expression Print - grep Command.srt |
3.52KB |
5. Insert Data to Table.mp4 |
74.66MB |
5. Insert Data to Table.srt |
12.49KB |
5. IoT Security.mp4 |
117.31MB |
5. IoT Security.srt |
10.05KB |
5. Linux Boot Errors.mp4 |
16.92MB |
5. Linux Boot Errors.srt |
2.58KB |
5. Linux Signs $, #, %, ~.mp4 |
4.86MB |
5. Linux Signs $, #, %, ~.srt |
1.16KB |
5. MSCONFIG.mp4 |
13.23MB |
5. MSCONFIG.srt |
2.40KB |
5. PROM, EPROM, EEPROM.mp4 |
17.19MB |
5. PROM, EPROM, EEPROM.srt |
1.13KB |
5. Security of the Virtualization.mp4 |
43.11MB |
5. Security of the Virtualization.srt |
3.23KB |
5. TCPIP (Networking) Basics.mp4 |
71.24MB |
5. TCPIP (Networking) Basics.srt |
17.65KB |
5. What is a Hacker.mp4 |
25.06MB |
5. What is a Hacker.srt |
8.69KB |
5. What is Cloud Security.mp4 |
17.39MB |
5. What is Cloud Security.srt |
4.44KB |
5. What is Projector.mp4 |
7.24MB |
5. What is Projector.srt |
1.58KB |
5. What is Storing.mp4 |
14.42MB |
5. What is Storing.srt |
980B |
5. Who Else Is Using the Internet.mp4 |
5.60MB |
5. Who Else Is Using the Internet.srt |
1.73KB |
5. Wireless Encryption Protocols WEP vs. WPA.mp4 |
17.85MB |
5. Wireless Encryption Protocols WEP vs. WPA.srt |
4.07KB |
50 |
623.04KB |
51 |
755.34KB |
52 |
841.43KB |
53 |
127.34KB |
54 |
170.81KB |
55 |
821.13KB |
56 |
90.07KB |
57 |
759.70KB |
58 |
33.13KB |
59 |
386.05KB |
6 |
563.51KB |
6. BIOS Time and Setting Resets.mp4 |
12.28MB |
6. BIOS Time and Setting Resets.srt |
3.42KB |
6. Concatenate Files - cat Command.mp4 |
14.16MB |
6. Concatenate Files - cat Command.srt |
2.23KB |
6. DVI.mp4 |
7.44MB |
6. DVI.srt |
1.50KB |
6. How does cloud security work.mp4 |
14.48MB |
6. How does cloud security work.srt |
3.84KB |
6. Mobile Security Threats.mp4 |
138.45MB |
6. Mobile Security Threats.srt |
11.54KB |
6. OSI Reference Model vs. TCPIP Reference Model.mp4 |
14.42MB |
6. OSI Reference Model vs. TCPIP Reference Model.srt |
2.84KB |
6. Output.mp4 |
22.08MB |
6. Output.srt |
1.78KB |
6. Services (Services.msc).mp4 |
14.40MB |
6. Services (Services.msc).srt |
1.67KB |
6. Unix Name - uname Command.mp4 |
4.42MB |
6. Unix Name - uname Command.srt |
1001B |
6. Update Data in A Table.mp4 |
43.43MB |
6. Update Data in A Table.srt |
6.15KB |
6. Virtualization Lab Exercise - 1.mp4 |
155.04MB |
6. Virtualization Lab Exercise - 1.srt |
9.20KB |
6. What is Attack What are the Stages.mp4 |
12.80MB |
6. What is Attack What are the Stages.srt |
4.01KB |
6. What is Flash Memory, Magnetic Storage Devices, Optical Storage Devices.mp4 |
35.50MB |
6. What is Flash Memory, Magnetic Storage Devices, Optical Storage Devices.srt |
2.60KB |
6. What is GPS.mp4 |
13.90MB |
6. What is GPS.srt |
2.99KB |
6. Windows.mp4 |
8.55MB |
6. Windows.srt |
2.44KB |
6. WPA 4-Way Handshake.mp4 |
26.62MB |
6. WPA 4-Way Handshake.srt |
6.11KB |
60 |
670.35KB |
61 |
966.46KB |
62 |
1008.77KB |
63 |
354.05KB |
64 |
403.81KB |
65 |
184.16KB |
66 |
391.97KB |
67 |
578.97KB |
68 |
860.10KB |
69 |
940.13KB |
7 |
98.76KB |
7. Apple Macintosh OS.mp4 |
7.43MB |
7. Apple Macintosh OS.srt |
1.81KB |
7. Attempts to Boot to Incorrect Device.mp4 |
8.16MB |
7. Attempts to Boot to Incorrect Device.srt |
3.03KB |
7. Computer Components.mp4 |
45.30MB |
7. Computer Components.srt |
3.20KB |
7. Delete Data and AdventureWorks.mp4 |
54.95MB |
7. Delete Data and AdventureWorks.srt |
7.03KB |
7. Display Output - echo Command.mp4 |
9.77MB |
7. Display Output - echo Command.srt |
1.58KB |
7. Network attached storage.mp4 |
27.26MB |
7. Network attached storage.srt |
1.98KB |
7. Network Layers in Real World.mp4 |
88.02MB |
7. Network Layers in Real World.srt |
9.45KB |
7. Output Redirection.mp4 |
15.99MB |
7. Output Redirection.srt |
2.57KB |
7. Performance Monitor.mp4 |
8.98MB |
7. Performance Monitor.srt |
2.35KB |
7. SATA Cables.mp4 |
5.67MB |
7. SATA Cables.srt |
1.60KB |
7. Terms Asset, Threat, Vulnerability, Risk, Exploit.mp4 |
11.71MB |
7. Terms Asset, Threat, Vulnerability, Risk, Exploit.srt |
3.52KB |
7. Virtualization Lab Exercise - 2.mp4 |
227.27MB |
7. Virtualization Lab Exercise - 2.srt |
16.48KB |
7. What makes cloud security different.mp4 |
19.76MB |
7. What makes cloud security different.srt |
3.97KB |
7. Wireshark WEP and WPA.mp4 |
9.17MB |
7. Wireshark WEP and WPA.srt |
1.12KB |
70 |
332.63KB |
71 |
462.74KB |
72 |
153.02KB |
73 |
386.29KB |
74 |
896.54KB |
75 |
902.11KB |
76 |
155.84KB |
77 |
246.22KB |
78 |
492.17KB |
79 |
222.56KB |
8 |
705.16KB |
8. Cloud Storage.mp4 |
20.62MB |
8. Cloud Storage.srt |
1.57KB |
8. Input Devices.mp4 |
41.57MB |
8. Input Devices.srt |
2.83KB |
8. Layer 2 - Data Link Layer.mp4 |
16.58MB |
8. Layer 2 - Data Link Layer.srt |
4.52KB |
8. Linux Systems.mp4 |
83.46MB |
8. Linux Systems.srt |
5.75KB |
8. Output Redirection Pipe “”.mp4 |
17.73MB |
8. Output Redirection Pipe “”.srt |
2.57KB |
8. Task Manager.mp4 |
23.16MB |
8. Task Manager.srt |
3.57KB |
8. USB.mp4 |
6.95MB |
8. USB.srt |
2.69KB |
8. What is a Library - 2.mp4 |
68.62MB |
8. What is a Library - 2.srt |
4.61KB |
8. What is a Zero-day Attack.mp4 |
31.90MB |
8. What is a Zero-day Attack.srt |
4.79KB |
8. Why is cloud security important.mp4 |
10.40MB |
8. Why is cloud security important.srt |
760B |
80 |
752.10KB |
81 |
969.22KB |
82 |
990.36KB |
83 |
1021.88KB |
84 |
72.83KB |
85 |
151.91KB |
86 |
272.70KB |
87 |
522.69KB |
88 |
625.09KB |
89 |
740.70KB |
9 |
399.90KB |
9. Android.mp4 |
4.34MB |
9. Android.srt |
1.90KB |
9. Cloud Security Benefits& Disadvantages.mp4 |
29.69MB |
9. Cloud Security Benefits& Disadvantages.srt |
8.74KB |
9. Disk Management.mp4 |
14.96MB |
9. Disk Management.srt |
2.14KB |
9. Layer 2 Ethernet - Principles, Frames & Headers.mp4 |
31.32MB |
9. Layer 2 Ethernet - Principles, Frames & Headers.srt |
4.67KB |
9. Make Directory - mkdir Command.mp4 |
8.78MB |
9. Make Directory - mkdir Command.srt |
1.35KB |
9. What are BotBotnet and Zombies.mp4 |
9.77MB |
9. What are BotBotnet and Zombies.srt |
1.98KB |
90 |
829.01KB |
91 |
836.11KB |
92 |
861.41KB |
93 |
85.31KB |
94 |
128.90KB |
95 |
434.89KB |
96 |
600.78KB |
97 |
916.55KB |
98 |
958.52KB |
99 |
12.82KB |
TutsNode.net.txt |
59B |