Torrent Info
Title Cyber Security Masterclass - All about IT Security
Category
Size 5.86GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 36.38KB
1 70.41KB
1. Application Architecture and Infrastructure.mp4 38.79MB
1. Application Architecture and Infrastructure.srt 2.62KB
1. Congratulations and next steps.mp4 15.77MB
1. Congratulations and next steps.srt 990B
1. Course Introduction.mp4 69.53MB
1. Course Introduction.srt 3.84KB
1. Cryptography, Hashing and Digital Signatures Intro.mp4 40.52MB
1. Cryptography, Hashing and Digital Signatures Intro.srt 2.48KB
1. Cybersecurity Principles Intro.mp4 21.75MB
1. Cybersecurity Principles Intro.srt 1.34KB
1. IAM and IAA - Identity and Access Management.mp4 148.42MB
1. IAM and IAA - Identity and Access Management.srt 9.58KB
1. Incident Detection and Response.mp4 94.35MB
1. Incident Detection and Response.srt 8.40KB
1. Infrastructure Security Intro.mp4 29.61MB
1. Infrastructure Security Intro.srt 1.85KB
1. Logging and Monitoring.mp4 197.09MB
1. Logging and Monitoring.srt 14.16KB
1. Secure Protocols Intro.mp4 43.61MB
1. Secure Protocols Intro.srt 2.26KB
1. System Resilience Intro.mp4 223.86MB
1. System Resilience Intro.srt 12.87KB
10 594.70KB
10. RSA.mp4 85.87MB
10. RSA.srt 9.88KB
10. Secure DevOps.mp4 139.31MB
10. Secure DevOps.srt 10.46KB
11 709.09KB
11. ECDSA.mp4 98.43MB
11. ECDSA.srt 7.15KB
11. Secure Development and Deployment.mp4 72.15MB
11. Secure Development and Deployment.srt 7.20KB
12 787.43KB
12. Application Architecture and Infrastructure.html 203B
12. Quantum Computing.mp4 96.42MB
12. Quantum Computing.srt 5.57KB
13 71.53KB
13. Cryptography, Hashing and Digital Signatures.html 203B
14 456.70KB
15 950.56KB
16 812.88KB
17 924.33KB
18 395.57KB
19 889.28KB
2 138.69KB
2. Bonus and thank you note.html 499B
2. Cloud Models and Shared Responsibility model.mp4 229.93MB
2. Cloud Models and Shared Responsibility model.srt 18.62KB
2. Consensus Mechanisms.mp4 106.64MB
2. Consensus Mechanisms.srt 9.26KB
2. Contingency Planning.mp4 69.87MB
2. Contingency Planning.srt 4.60KB
2. Course housekeeping.mp4 31.72MB
2. Course housekeeping.srt 2.11KB
2. Data Encryption.mp4 164.72MB
2. Data Encryption.srt 13.39KB
2. Infrastructure hardening.mp4 76.51MB
2. Infrastructure hardening.srt 4.22KB
2. Logging and Monitoring Quiz.html 203B
2. MFA - Multi Factor Authentication.mp4 106.91MB
2. MFA - Multi Factor Authentication.srt 5.96KB
2. Secure Protocols.mp4 158.92MB
2. Secure Protocols.srt 13.72KB
2. The CIA of Cybersecurity.mp4 139.23MB
2. The CIA of Cybersecurity.srt 10.75KB
20 97.38KB
21 832.64KB
22 92.57KB
23 365.11KB
24 657.42KB
25 245.12KB
26 768.01KB
27 919.39KB
28 583.99KB
29 598.07KB
3 255.38KB
3. Application infrastructure.mp4 129.55MB
3. Application infrastructure.srt 12.51KB
3. Authorization and Permissions.mp4 172.83MB
3. Authorization and Permissions.srt 12.08KB
3. Denial of Service.mp4 121.10MB
3. Denial of Service.srt 10.25KB
3. Hashing.mp4 116.90MB
3. Hashing.srt 9.81KB
3. Incident Detection and Response Quiz.html 203B
3. Network Models.mp4 106.36MB
3. Network Models.srt 10.93KB
3. Non-repudiation.mp4 45.48MB
3. Non-repudiation.srt 2.72KB
3. System Resilience quiz.html 203B
30 669.70KB
31 735.23KB
32 771.27KB
33 728.85KB
34 486.61KB
35 137.38KB
36 279.58KB
37 503.81KB
38 642.57KB
39 870.27KB
4 930.66KB
4. Hash functions characteristics.mp4 127.07MB
4. Hash functions characteristics.srt 11.55KB
4. How to measure risk.mp4 176.07MB
4. How to measure risk.srt 10.97KB
4. Man-in-the-middle attack.mp4 92.25MB
4. Man-in-the-middle attack.srt 9.72KB
4. Permissioned and Permissionless.mp4 45.07MB
4. Permissioned and Permissionless.srt 2.82KB
4. TLS.mp4 58.84MB
4. TLS.srt 5.22KB
4. VPCs.mp4 34.88MB
4. VPCs.srt 3.46KB
40 132.35KB
41 480.46KB
42 772.63KB
43 160.86KB
44 77.86KB
45 130.54KB
46 536.52KB
47 952.49KB
48 395.05KB
49 488.34KB
5 963.84KB
5. ALCs.mp4 56.92MB
5. ALCs.srt 2.96KB
5. Attacking applications.mp4 93.28MB
5. Attacking applications.srt 9.76KB
5. Digital Signatures.mp4 26.19MB
5. Digital Signatures.srt 2.32KB
5. How to measure risk (part II).mp4 209.75MB
5. How to measure risk (part II).srt 11.82KB
5. IP Models.mp4 47.87MB
5. IP Models.srt 4.46KB
5. NACLs.mp4 76.37MB
5. NACLs.srt 10.20KB
50 217.67KB
51 910.62KB
52 125.18KB
53 286.67KB
54 394.54KB
55 825.77KB
56 255.85KB
6 948.21KB
6. Application protocols.mp4 79.73MB
6. Application protocols.srt 12.03KB
6. Cryptography Basics.mp4 108.19MB
6. Cryptography Basics.srt 7.62KB
6. Governance and Procurement.mp4 105.76MB
6. Governance and Procurement.srt 7.80KB
6. Least Privilege and Segregation of Duties.mp4 88.29MB
6. Least Privilege and Segregation of Duties.srt 5.18KB
6. Malware.mp4 186.06MB
6. Malware.srt 12.12KB
6. Network Firewalls.mp4 35.11MB
6. Network Firewalls.srt 2.71KB
7 170.05KB
7. Cryptography Methods.mp4 119.13MB
7. Cryptography Methods.srt 6.72KB
7. Cybersecurity Principles Quiz.html 203B
7. Password Security.mp4 124.21MB
7. Password Security.srt 8.01KB
7. Secure protocols quiz.html 203B
7. Social Engineering Attacks.mp4 274.51MB
7. Social Engineering Attacks.srt 17.73KB
7. Testing your application.mp4 120.61MB
7. Testing your application.srt 11.12KB
8 290.05KB
8. Infrastructure Security quiz.html 203B
8. Random numbers.mp4 103.25MB
8. Random numbers.srt 9.41KB
8. Testing your Infrastructure.mp4 101.10MB
8. Testing your Infrastructure.srt 8.83KB
8. User Authentication Methods.mp4 132.93MB
8. User Authentication Methods.srt 9.37KB
9 81.69KB
9. IAM Quiz.html 203B
9. Other security practices.mp4 69.25MB
9. Other security practices.srt 6.75KB
9. Prime numbers.mp4 87.52MB
9. Prime numbers.srt 7.73KB
TutsNode.com.txt 63B
Distribution statistics by country
France (FR) 1
Sweden (SE) 1
Ethiopia (ET) 1
Rwanda (RW) 1
Taiwan (TW) 1
Zimbabwe (ZW) 1
Nigeria (NG) 1
Mauritius (MU) 1
Singapore (SG) 1
China (CN) 1
Jamaica (JM) 1
Total 11
IP List List of IP addresses which were distributed this torrent