Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
36.38KB |
1 |
70.41KB |
1. Application Architecture and Infrastructure.mp4 |
38.79MB |
1. Application Architecture and Infrastructure.srt |
2.62KB |
1. Congratulations and next steps.mp4 |
15.77MB |
1. Congratulations and next steps.srt |
990B |
1. Course Introduction.mp4 |
69.53MB |
1. Course Introduction.srt |
3.84KB |
1. Cryptography, Hashing and Digital Signatures Intro.mp4 |
40.52MB |
1. Cryptography, Hashing and Digital Signatures Intro.srt |
2.48KB |
1. Cybersecurity Principles Intro.mp4 |
21.75MB |
1. Cybersecurity Principles Intro.srt |
1.34KB |
1. IAM and IAA - Identity and Access Management.mp4 |
148.42MB |
1. IAM and IAA - Identity and Access Management.srt |
9.58KB |
1. Incident Detection and Response.mp4 |
94.35MB |
1. Incident Detection and Response.srt |
8.40KB |
1. Infrastructure Security Intro.mp4 |
29.61MB |
1. Infrastructure Security Intro.srt |
1.85KB |
1. Logging and Monitoring.mp4 |
197.09MB |
1. Logging and Monitoring.srt |
14.16KB |
1. Secure Protocols Intro.mp4 |
43.61MB |
1. Secure Protocols Intro.srt |
2.26KB |
1. System Resilience Intro.mp4 |
223.86MB |
1. System Resilience Intro.srt |
12.87KB |
10 |
594.70KB |
10. RSA.mp4 |
85.87MB |
10. RSA.srt |
9.88KB |
10. Secure DevOps.mp4 |
139.31MB |
10. Secure DevOps.srt |
10.46KB |
11 |
709.09KB |
11. ECDSA.mp4 |
98.43MB |
11. ECDSA.srt |
7.15KB |
11. Secure Development and Deployment.mp4 |
72.15MB |
11. Secure Development and Deployment.srt |
7.20KB |
12 |
787.43KB |
12. Application Architecture and Infrastructure.html |
203B |
12. Quantum Computing.mp4 |
96.42MB |
12. Quantum Computing.srt |
5.57KB |
13 |
71.53KB |
13. Cryptography, Hashing and Digital Signatures.html |
203B |
14 |
456.70KB |
15 |
950.56KB |
16 |
812.88KB |
17 |
924.33KB |
18 |
395.57KB |
19 |
889.28KB |
2 |
138.69KB |
2. Bonus and thank you note.html |
499B |
2. Cloud Models and Shared Responsibility model.mp4 |
229.93MB |
2. Cloud Models and Shared Responsibility model.srt |
18.62KB |
2. Consensus Mechanisms.mp4 |
106.64MB |
2. Consensus Mechanisms.srt |
9.26KB |
2. Contingency Planning.mp4 |
69.87MB |
2. Contingency Planning.srt |
4.60KB |
2. Course housekeeping.mp4 |
31.72MB |
2. Course housekeeping.srt |
2.11KB |
2. Data Encryption.mp4 |
164.72MB |
2. Data Encryption.srt |
13.39KB |
2. Infrastructure hardening.mp4 |
76.51MB |
2. Infrastructure hardening.srt |
4.22KB |
2. Logging and Monitoring Quiz.html |
203B |
2. MFA - Multi Factor Authentication.mp4 |
106.91MB |
2. MFA - Multi Factor Authentication.srt |
5.96KB |
2. Secure Protocols.mp4 |
158.92MB |
2. Secure Protocols.srt |
13.72KB |
2. The CIA of Cybersecurity.mp4 |
139.23MB |
2. The CIA of Cybersecurity.srt |
10.75KB |
20 |
97.38KB |
21 |
832.64KB |
22 |
92.57KB |
23 |
365.11KB |
24 |
657.42KB |
25 |
245.12KB |
26 |
768.01KB |
27 |
919.39KB |
28 |
583.99KB |
29 |
598.07KB |
3 |
255.38KB |
3. Application infrastructure.mp4 |
129.55MB |
3. Application infrastructure.srt |
12.51KB |
3. Authorization and Permissions.mp4 |
172.83MB |
3. Authorization and Permissions.srt |
12.08KB |
3. Denial of Service.mp4 |
121.10MB |
3. Denial of Service.srt |
10.25KB |
3. Hashing.mp4 |
116.90MB |
3. Hashing.srt |
9.81KB |
3. Incident Detection and Response Quiz.html |
203B |
3. Network Models.mp4 |
106.36MB |
3. Network Models.srt |
10.93KB |
3. Non-repudiation.mp4 |
45.48MB |
3. Non-repudiation.srt |
2.72KB |
3. System Resilience quiz.html |
203B |
30 |
669.70KB |
31 |
735.23KB |
32 |
771.27KB |
33 |
728.85KB |
34 |
486.61KB |
35 |
137.38KB |
36 |
279.58KB |
37 |
503.81KB |
38 |
642.57KB |
39 |
870.27KB |
4 |
930.66KB |
4. Hash functions characteristics.mp4 |
127.07MB |
4. Hash functions characteristics.srt |
11.55KB |
4. How to measure risk.mp4 |
176.07MB |
4. How to measure risk.srt |
10.97KB |
4. Man-in-the-middle attack.mp4 |
92.25MB |
4. Man-in-the-middle attack.srt |
9.72KB |
4. Permissioned and Permissionless.mp4 |
45.07MB |
4. Permissioned and Permissionless.srt |
2.82KB |
4. TLS.mp4 |
58.84MB |
4. TLS.srt |
5.22KB |
4. VPCs.mp4 |
34.88MB |
4. VPCs.srt |
3.46KB |
40 |
132.35KB |
41 |
480.46KB |
42 |
772.63KB |
43 |
160.86KB |
44 |
77.86KB |
45 |
130.54KB |
46 |
536.52KB |
47 |
952.49KB |
48 |
395.05KB |
49 |
488.34KB |
5 |
963.84KB |
5. ALCs.mp4 |
56.92MB |
5. ALCs.srt |
2.96KB |
5. Attacking applications.mp4 |
93.28MB |
5. Attacking applications.srt |
9.76KB |
5. Digital Signatures.mp4 |
26.19MB |
5. Digital Signatures.srt |
2.32KB |
5. How to measure risk (part II).mp4 |
209.75MB |
5. How to measure risk (part II).srt |
11.82KB |
5. IP Models.mp4 |
47.87MB |
5. IP Models.srt |
4.46KB |
5. NACLs.mp4 |
76.37MB |
5. NACLs.srt |
10.20KB |
50 |
217.67KB |
51 |
910.62KB |
52 |
125.18KB |
53 |
286.67KB |
54 |
394.54KB |
55 |
825.77KB |
56 |
255.85KB |
6 |
948.21KB |
6. Application protocols.mp4 |
79.73MB |
6. Application protocols.srt |
12.03KB |
6. Cryptography Basics.mp4 |
108.19MB |
6. Cryptography Basics.srt |
7.62KB |
6. Governance and Procurement.mp4 |
105.76MB |
6. Governance and Procurement.srt |
7.80KB |
6. Least Privilege and Segregation of Duties.mp4 |
88.29MB |
6. Least Privilege and Segregation of Duties.srt |
5.18KB |
6. Malware.mp4 |
186.06MB |
6. Malware.srt |
12.12KB |
6. Network Firewalls.mp4 |
35.11MB |
6. Network Firewalls.srt |
2.71KB |
7 |
170.05KB |
7. Cryptography Methods.mp4 |
119.13MB |
7. Cryptography Methods.srt |
6.72KB |
7. Cybersecurity Principles Quiz.html |
203B |
7. Password Security.mp4 |
124.21MB |
7. Password Security.srt |
8.01KB |
7. Secure protocols quiz.html |
203B |
7. Social Engineering Attacks.mp4 |
274.51MB |
7. Social Engineering Attacks.srt |
17.73KB |
7. Testing your application.mp4 |
120.61MB |
7. Testing your application.srt |
11.12KB |
8 |
290.05KB |
8. Infrastructure Security quiz.html |
203B |
8. Random numbers.mp4 |
103.25MB |
8. Random numbers.srt |
9.41KB |
8. Testing your Infrastructure.mp4 |
101.10MB |
8. Testing your Infrastructure.srt |
8.83KB |
8. User Authentication Methods.mp4 |
132.93MB |
8. User Authentication Methods.srt |
9.37KB |
9 |
81.69KB |
9. IAM Quiz.html |
203B |
9. Other security practices.mp4 |
69.25MB |
9. Other security practices.srt |
6.75KB |
9. Prime numbers.mp4 |
87.52MB |
9. Prime numbers.srt |
7.73KB |
TutsNode.com.txt |
63B |