Torrent Info
Title Computer Security and Systems Management Specialization
Category
Size 2.39GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 107B
01_adding-users.en.srt 5.43KB
01_adding-users.en.txt 3.21KB
01_adding-users.mp4 7.94MB
01_built-in-security-controls.en.srt 9.13KB
01_built-in-security-controls.en.txt 5.55KB
01_built-in-security-controls.mp4 40.21MB
01_congratulations.en.srt 1.86KB
01_congratulations.en.txt 1.17KB
01_congratulations.mp4 9.17MB
01 don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me en srt 8.04KB
01 don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me en txt 4.89KB
01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.mp4 39.08MB
01_enterprise-install-of-centos.en.srt 4.92KB
01_enterprise-install-of-centos.en.txt 3.07KB
01_enterprise-install-of-centos.mp4 8.52MB
01_introduction.en.srt 5.59KB
01_introduction.en.srt 4.27KB
01_introduction.en.txt 2.59KB
01_introduction.en.txt 3.38KB
01_introduction.mp4 21.99MB
01_introduction.mp4 17.40MB
01_linux-in-the-enterprise.en.srt 10.32KB
01_linux-in-the-enterprise.en.txt 6.32KB
01_linux-in-the-enterprise.mp4 44.04MB
01_policies-part-1-organizational-policies.en.srt 9.46KB
01_policies-part-1-organizational-policies.en.txt 5.77KB
01_policies-part-1-organizational-policies.mp4 40.36MB
01_security-at-the-forefront.en.srt 10.20KB
01_security-at-the-forefront.en.txt 6.24KB
01_security-at-the-forefront.mp4 41.89MB
01_selinux.en.srt 9.01KB
01_selinux.en.txt 5.33KB
01_selinux.mp4 37.71MB
01_strategies-for-monitoring.en.srt 8.48KB
01_strategies-for-monitoring.en.txt 5.03KB
01_strategies-for-monitoring.mp4 37.50MB
01_updating-systems-in-the-enterprise.en.srt 7.98KB
01_updating-systems-in-the-enterprise.en.txt 4.91KB
01_updating-systems-in-the-enterprise.mp4 35.57MB
01_welcome.en.srt 4.99KB
01_welcome.en.txt 3.04KB
01_welcome.mp4 24.38MB
01_what-is-authorization.en.srt 7.71KB
01_what-is-authorization.en.txt 4.70KB
01_what-is-authorization.mp4 39.49MB
01_what-is-virtualization.en.srt 7.34KB
01_what-is-virtualization.en.txt 4.53KB
01_what-is-virtualization.mp4 37.90MB
01_why-do-we-need-to-learn-networking.en.srt 9.58KB
01_why-do-we-need-to-learn-networking.en.txt 5.82KB
01_why-do-we-need-to-learn-networking.mp4 46.40MB
01_why-information-security-in-the-first-place.en.srt 7.55KB
01_why-information-security-in-the-first-place.en.txt 4.74KB
01_why-information-security-in-the-first-place.mp4 31.83MB
01_windows-logon-process.en.srt 5.70KB
01_windows-logon-process.en.txt 3.65KB
01_windows-logon-process.mp4 9.02MB
02_about-linux-and-distributions.en.srt 10.76KB
02_about-linux-and-distributions.en.txt 6.29KB
02_about-linux-and-distributions.mp4 46.82MB
02_attack-surfaces.en.srt 9.27KB
02_attack-surfaces.en.txt 5.58KB
02_attack-surfaces.mp4 41.88MB
02_rights-and-permissions.en.srt 7.16KB
02_rights-and-permissions.en.txt 4.34KB
02_rights-and-permissions.mp4 11.03MB
02_splunk.en.srt 6.23KB
02_splunk.en.txt 3.78KB
02_splunk.mp4 9.27MB
02_types-of-virtualization.en.srt 8.93KB
02_types-of-virtualization.en.txt 5.55KB
02_types-of-virtualization.mp4 38.41MB
02_what-is-personal-computing.en.srt 6.79KB
02_what-is-personal-computing.en.txt 4.21KB
02_what-is-personal-computing.mp4 28.98MB
02_when-something-goes-wrong.en.srt 8.49KB
02_when-something-goes-wrong.en.txt 4.94KB
02_when-something-goes-wrong.mp4 37.64MB
02_windows-in-the-enterprise.en.srt 7.05KB
02_windows-in-the-enterprise.en.txt 4.20KB
02_windows-in-the-enterprise.mp4 29.93MB
03_access-control.en.srt 6.04KB
03_access-control.en.txt 3.62KB
03_access-control.mp4 10.07MB
03_baselining-and-assessment.en.srt 6.77KB
03_baselining-and-assessment.en.txt 4.26KB
03_baselining-and-assessment.mp4 31.98MB
03_integrity.en.srt 7.40KB
03_integrity.en.txt 4.32KB
03_integrity.mp4 29.52MB
03_linux-security.en.srt 13.32KB
03_linux-security.en.txt 8.06KB
03_linux-security.mp4 61.12MB
03_networking-in-linux.en.srt 7.31KB
03_networking-in-linux.en.txt 4.33KB
03_networking-in-linux.mp4 11.34MB
03_policies-part-2-technical-policies.en.srt 6.20KB
03_policies-part-2-technical-policies.en.txt 3.82KB
03_policies-part-2-technical-policies.mp4 29.33MB
03_restricting-access-to-software-and-resources.en.srt 10.28KB
03_restricting-access-to-software-and-resources.en.txt 6.22KB
03_restricting-access-to-software-and-resources.mp4 18.78MB
03_securing-users.en.srt 8.15KB
03_securing-users.en.txt 4.74KB
03_securing-users.mp4 14.74MB
03_what-is-a-secure-computer.en.srt 5.22KB
03_what-is-a-secure-computer.en.txt 3.24KB
03_what-is-a-secure-computer.mp4 22.06MB
03_what-is-enterprise-computing.en.srt 12.41KB
03_what-is-enterprise-computing.en.txt 7.46KB
03_what-is-enterprise-computing.mp4 52.12MB
03_when-to-use-and-not-use-virtualization.en.srt 7.14KB
03_when-to-use-and-not-use-virtualization.en.txt 4.20KB
03_when-to-use-and-not-use-virtualization.mp4 33.38MB
03_windows-server-install.en.srt 6.22KB
03_windows-server-install.en.txt 3.83KB
03_windows-server-install.mp4 8.02MB
04_about-the-instructor.en.srt 10.78KB
04_about-the-instructor.en.srt 10.56KB
04_about-the-instructor.en.srt 10.56KB
04_about-the-instructor.en.txt 6.24KB
04_about-the-instructor.en.txt 6.23KB
04_about-the-instructor.en.txt 6.19KB
04_about-the-instructor.mp4 155.29MB
04_about-the-instructor.mp4 155.29MB
04_about-the-instructor.mp4 155.29MB
04_active-directory.en.srt 16.42KB
04_active-directory.en.txt 9.65KB
04_active-directory.mp4 24.28MB
04_auditing.en.srt 12.73KB
04_auditing.en.txt 7.54KB
04_auditing.mp4 21.66MB
04_introduction.en.srt 5.73KB
04_introduction.en.txt 3.71KB
04_introduction.mp4 25.73MB
04_managing-users-on-an-enterprise-level.en.srt 7.01KB
04_managing-users-on-an-enterprise-level.en.txt 4.10KB
04_managing-users-on-an-enterprise-level.mp4 11.25MB
04_risk-in-system-management.en.srt 12.79KB
04_risk-in-system-management.en.txt 7.74KB
04_risk-in-system-management.mp4 53.73MB
04_software-firewalls-in-linux.en.srt 8.98KB
04_software-firewalls-in-linux.en.txt 5.02KB
04_software-firewalls-in-linux.mp4 16.77MB
04_what-roles-are-there-in-system-management.en.srt 6.35KB
04_what-roles-are-there-in-system-management.en.txt 3.90KB
04_what-roles-are-there-in-system-management.mp4 27.84MB
04_your-computer-vs-an-enterprise-system.en.srt 7.92KB
04_your-computer-vs-an-enterprise-system.en.txt 5.11KB
04_your-computer-vs-an-enterprise-system.mp4 33.83MB
05_about-the-instructor.en.srt 10.38KB
05_about-the-instructor.en.txt 6.18KB
05_about-the-instructor.mp4 155.29MB
05_access-control.en.srt 8.97KB
05_access-control.en.txt 5.35KB
05_access-control.mp4 13.61MB
05_confidentiality-integrity-and-availability.en.srt 9.70KB
05_confidentiality-integrity-and-availability.en.txt 5.91KB
05_confidentiality-integrity-and-availability.mp4 46.50MB
05_group-policy.en.srt 8.30KB
05_group-policy.en.txt 4.99KB
05_group-policy.mp4 12.19MB
05_networking-in-windows.en.srt 10.75KB
05_networking-in-windows.en.txt 6.52KB
05_networking-in-windows.mp4 15.06MB
05_osi-model.en.srt 8.60KB
05_osi-model.en.txt 5.22KB
05_osi-model.mp4 36.71MB
05_security-considerations-for-windows-systems.en.srt 8.96KB
05_security-considerations-for-windows-systems.en.txt 5.37KB
05_security-considerations-for-windows-systems.mp4 38.92MB
05_separation-of-duties.en.srt 8.24KB
05_separation-of-duties.en.txt 5.06KB
05_separation-of-duties.mp4 36.81MB
05_services-within-linux.en.srt 10.74KB
05_services-within-linux.en.txt 6.03KB
05_services-within-linux.mp4 16.18MB
05_sudo.en.srt 6.87KB
05_sudo.en.txt 4.06KB
05_sudo.mp4 13.44MB
05_what-is-going-to-prepare-me-for-practical-system-management.en.srt 8.07KB
05_what-is-going-to-prepare-me-for-practical-system-management.en.txt 4.96KB
05_what-is-going-to-prepare-me-for-practical-system-management.mp4 35.36MB
06_planning-for-disaster.en.srt 10.08KB
06_planning-for-disaster.en.txt 5.81KB
06_planning-for-disaster.mp4 41.18MB
06_ssh.en.srt 12.87KB
06_ssh.en.txt 7.37KB
06_ssh.mp4 24.59MB
06_windows-and-encryption.en.srt 6.36KB
06_windows-and-encryption.en.txt 3.92KB
06_windows-and-encryption.mp4 9.65MB
06_working-with-other-systems.en.srt 10.17KB
06_working-with-other-systems.en.txt 6.08KB
06_working-with-other-systems.mp4 44.73MB
07_if-you-build-it-they-will-get-around-it.en.srt 10.41KB
07_if-you-build-it-they-will-get-around-it.en.txt 6.11KB
07_if-you-build-it-they-will-get-around-it.mp4 41.96MB
07_syslog.en.srt 12.30KB
07_syslog.en.txt 7.45KB
07_syslog.mp4 21.09MB
08_cron.en.srt 5.50KB
08_cron.en.txt 3.35KB
08_cron.mp4 7.21MB
1 579B
10 272.71KB
11 469.35KB
12 44.67KB
13 108.80KB
14 118.92KB
15 328.77KB
16 139.19KB
17 292.18KB
18 8.84KB
19 432.74KB
2 28B
20 77.06KB
21 90.57KB
22 99.49KB
23 297.23KB
24 371.49KB
25 1.26KB
26 193.60KB
27 294.92KB
28 435.85KB
29 143.91KB
3 545B
30 173.74KB
31 119.31KB
32 16.17KB
33 169.57KB
34 72.40KB
35 486.96KB
36 177.10KB
37 21.89KB
38 163.18KB
39 277.33KB
4 344.16KB
40 418.61KB
41 125.18KB
42 224.44KB
43 450.45KB
44 12.52KB
45 346.06KB
46 418.33KB
47 228.22KB
48 104.27KB
49 233.10KB
5 277.58KB
50 332.38KB
51 451.94KB
52 263.15KB
53 404.47KB
54 57.76KB
55 314.97KB
56 162.53KB
57 252.30KB
58 479.28KB
59 439.97KB
6 390.99KB
60 356.67KB
61 236.22KB
62 336.88KB
63 487.86KB
64 495.29KB
65 487.09KB
66 59.57KB
7 182.96KB
8 507.34KB
9 100.47KB
TutsNode.net.txt 63B
Distribution statistics by country
Morocco (MA) 1
Sweden (SE) 1
France (FR) 1
Ethiopia (ET) 1
Nicaragua (NI) 1
India (IN) 1
Russia (RU) 1
Total 7
IP List List of IP addresses which were distributed this torrent