Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
195B |
001. GIAC Security Essentials (GSEC) Introduction.mp4 |
9.21MB |
001. GIAC Security Essentials (GSEC) Introduction en.srt |
1.84KB |
001. GIAC Security Essentials (GSEC) Summary.mp4 |
6.56MB |
001. GIAC Security Essentials (GSEC) Summary en.srt |
1.59KB |
001. Learning objectives.mp4 |
3.63MB |
001. Learning objectives.mp4 |
3.02MB |
001. Learning objectives.mp4 |
3.00MB |
001. Learning objectives.mp4 |
2.75MB |
001. Learning objectives.mp4 |
2.71MB |
001. Learning objectives.mp4 |
2.60MB |
001. Learning objectives.mp4 |
2.58MB |
001. Learning objectives.mp4 |
2.56MB |
001. Learning objectives.mp4 |
2.55MB |
001. Learning objectives.mp4 |
2.50MB |
001. Learning objectives.mp4 |
2.48MB |
001. Learning objectives.mp4 |
2.41MB |
001. Learning objectives.mp4 |
2.39MB |
001. Learning objectives.mp4 |
2.39MB |
001. Learning objectives.mp4 |
2.37MB |
001. Learning objectives.mp4 |
2.29MB |
001. Learning objectives.mp4 |
2.29MB |
001. Learning objectives.mp4 |
2.23MB |
001. Learning objectives.mp4 |
2.21MB |
001. Learning objectives.mp4 |
2.16MB |
001. Learning objectives.mp4 |
2.14MB |
001. Learning objectives.mp4 |
2.13MB |
001. Learning objectives.mp4 |
2.07MB |
001. Learning objectives.mp4 |
2.06MB |
001. Learning objectives.mp4 |
2.01MB |
001. Learning objectives.mp4 |
1.88MB |
001. Learning objectives.mp4 |
1.86MB |
001. Learning objectives en.srt |
538B |
001. Learning objectives en.srt |
492B |
001. Learning objectives en.srt |
299B |
001. Learning objectives en.srt |
681B |
001. Learning objectives en.srt |
400B |
001. Learning objectives en.srt |
411B |
001. Learning objectives en.srt |
399B |
001. Learning objectives en.srt |
402B |
001. Learning objectives en.srt |
334B |
001. Learning objectives en.srt |
488B |
001. Learning objectives en.srt |
423B |
001. Learning objectives en.srt |
501B |
001. Learning objectives en.srt |
560B |
001. Learning objectives en.srt |
567B |
001. Learning objectives en.srt |
495B |
001. Learning objectives en.srt |
494B |
001. Learning objectives en.srt |
485B |
001. Learning objectives en.srt |
437B |
001. Learning objectives en.srt |
424B |
001. Learning objectives en.srt |
411B |
001. Learning objectives en.srt |
408B |
001. Learning objectives en.srt |
400B |
001. Learning objectives en.srt |
383B |
001. Learning objectives en.srt |
381B |
001. Learning objectives en.srt |
357B |
001. Learning objectives en.srt |
357B |
001. Learning objectives en.srt |
331B |
001. Module introduction.mp4 |
4.65MB |
001. Module introduction.mp4 |
4.59MB |
001. Module introduction.mp4 |
3.30MB |
001. Module introduction.mp4 |
3.05MB |
001. Module introduction.mp4 |
3.03MB |
001. Module introduction.mp4 |
2.55MB |
001. Module introduction en.srt |
978B |
001. Module introduction en.srt |
956B |
001. Module introduction en.srt |
665B |
001. Module introduction en.srt |
648B |
001. Module introduction en.srt |
586B |
001. Module introduction en.srt |
576B |
002. 1.1 Network Protocols and Reference Models.mp4 |
29.75MB |
002. 1.1 Network Protocols and Reference Models en.srt |
8.17KB |
002. 10.1 Overview of Endpoint Security.mp4 |
23.67MB |
002. 10.1 Overview of Endpoint Security en.srt |
6.31KB |
002. 11.1 Overview of Logging.mp4 |
30.01MB |
002. 11.1 Overview of Logging en.srt |
12.04KB |
002. 12.1 Overview of Vulnerability Management.mp4 |
35.79MB |
002. 12.1 Overview of Vulnerability Management en.srt |
9.15KB |
002. 13.1 Overview of Virtualization and VM Security.mp4 |
26.99MB |
002. 13.1 Overview of Virtualization and VM Security en.srt |
7.99KB |
002. 14.1 Overview of Cryptology and Cryptosystems.mp4 |
26.81MB |
002. 14.1 Overview of Cryptology and Cryptosystems en.srt |
7.48KB |
002. 15.1 Digital Signatures.mp4 |
14.12MB |
002. 15.1 Digital Signatures en.srt |
6.29KB |
002. 16.1 The Importance of Written Security Policies.mp4 |
18.22MB |
002. 16.1 The Importance of Written Security Policies en.srt |
4.70KB |
002. 17.1 Overview of Risk Management.mp4 |
31.81MB |
002. 17.1 Overview of Risk Management en.srt |
8.66KB |
002. 18.1 Fundamentals of Incident Handling.mp4 |
14.81MB |
002. 18.1 Fundamentals of Incident Handling en.srt |
4.39KB |
002. 19.1 Business Continuity Planning (BCP).mp4 |
25.79MB |
002. 19.1 Business Continuity Planning (BCP) en.srt |
7.65KB |
002. 2.1 CIA Triad and Parkerian Hexad.mp4 |
10.59MB |
002. 2.1 CIA Triad and Parkerian Hexad en.srt |
4.11KB |
002. 20.1 Operating Systems and Services.mp4 |
13.39MB |
002. 20.1 Operating Systems and Services en.srt |
6.45KB |
002. 21.1 NTFS and Shared Folder Permissions.mp4 |
14.39MB |
002. 21.1 NTFS and Shared Folder Permissions en.srt |
7.47KB |
002. 22.1 Security Templates and SCA Snap-in.mp4 |
15.84MB |
002. 22.1 Security Templates and SCA Snap-in en.srt |
8.83KB |
002. 23.1 Azure and High Availability.mp4 |
28.68MB |
002. 23.1 Azure and High Availability en.srt |
16.09KB |
002. 24.1 Windows PowerShell.mp4 |
37.59MB |
002. 24.1 Windows PowerShell en.srt |
13.44KB |
002. 25.1 Comparing Linux Operating Systems.mp4 |
26.70MB |
002. 25.1 Comparing Linux Operating Systems en.srt |
9.83KB |
002. 26.1 Starting Services at Boot Time.mp4 |
28.44MB |
002. 26.1 Starting Services at Boot Time en.srt |
11.10KB |
002. 27.1 Configuring and Monitoring Logs.mp4 |
21.33MB |
002. 27.1 Configuring and Monitoring Logs en.srt |
8.77KB |
002. 3.1 Access Control Concepts.mp4 |
84.39MB |
002. 3.1 Access Control Concepts en.srt |
25.65KB |
002. 4.1 Network Topologies and Zones.mp4 |
29.14MB |
002. 4.1 Network Topologies and Zones en.srt |
13.03KB |
002. 5.1 Introducing the Center for Internet Security (CIS).mp4 |
19.59MB |
002. 5.1 Introducing the Center for Internet Security (CIS) en.srt |
4.79KB |
002. 6.1 The Evolution of IEEE 802.11 Security.mp4 |
60.59MB |
002. 6.1 The Evolution of IEEE 802.11 Security en.srt |
16.35KB |
002. 7.1 Common Attack Types.mp4 |
71.03MB |
002. 7.1 Common Attack Types en.srt |
25.34KB |
002. 8.1 Defense in Depth Overview and Strategies.mp4 |
20.96MB |
002. 8.1 Defense in Depth Overview and Strategies en.srt |
6.96KB |
002. 9.1 Overview of Active Defense.mp4 |
19.01MB |
002. 9.1 Overview of Active Defense en.srt |
7.83KB |
003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4 |
53.45MB |
003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6 en.srt |
17.53KB |
003. 10.2 Host-based Intrusion Detection.mp4 |
11.82MB |
003. 10.2 Host-based Intrusion Detection en.srt |
2.87KB |
003. 11.2 Logging System Setup and Configuration.mp4 |
15.60MB |
003. 11.2 Logging System Setup and Configuration en.srt |
4.72KB |
003. 12.2 Network Scanning.mp4 |
40.69MB |
003. 12.2 Network Scanning en.srt |
12.75KB |
003. 13.2 Cloud Models and Value Proposition.mp4 |
74.20MB |
003. 13.2 Cloud Models and Value Proposition en.srt |
23.29KB |
003. 14.2 Cryptographic Hashing.mp4 |
25.56MB |
003. 14.2 Cryptographic Hashing en.srt |
9.40KB |
003. 15.2 IPsec.mp4 |
44.01MB |
003. 15.2 IPsec en.srt |
17.92KB |
003. 16.2 Standards, Guidelines, and Procedures.mp4 |
16.62MB |
003. 16.2 Standards, Guidelines, and Procedures en.srt |
4.32KB |
003. 17.2 Risk Management Best Practices.mp4 |
32.03MB |
003. 17.2 Risk Management Best Practices en.srt |
10.42KB |
003. 18.2 Six Step Incident Response Process.mp4 |
32.01MB |
003. 18.2 Six Step Incident Response Process en.srt |
8.60KB |
003. 19.2 Business Impact Analysis (BIA).mp4 |
10.76MB |
003. 19.2 Business Impact Analysis (BIA) en.srt |
3.62KB |
003. 2.2 Categories and Types of Controls.mp4 |
25.18MB |
003. 2.2 Categories and Types of Controls en.srt |
6.50KB |
003. 20.2 Windows Workgroups vs. Domains.mp4 |
25.58MB |
003. 20.2 Windows Workgroups vs. Domains en.srt |
15.29KB |
003. 21.2 Registry Keys and REGEDIT.EXE.mp4 |
11.93MB |
003. 21.2 Registry Keys and REGEDIT.EXE en.srt |
6.13KB |
003. 22.2 Understanding Group Policy Objects.mp4 |
13.06MB |
003. 22.2 Understanding Group Policy Objects en.srt |
8.20KB |
003. 23.2 Configuring Azure VM Attributes.mp4 |
24.87MB |
003. 23.2 Configuring Azure VM Attributes en.srt |
13.17KB |
003. 24.2 Administrative Tools and Utilities.mp4 |
43.19MB |
003. 24.2 Administrative Tools and Utilities en.srt |
12.89KB |
003. 25.2 Mobile Device Security.mp4 |
11.96MB |
003. 25.2 Mobile Device Security en.srt |
6.40KB |
003. 26.2 Configuration Management Tools.mp4 |
16.52MB |
003. 26.2 Configuration Management Tools en.srt |
7.98KB |
003. 27.2 Leveraging the Auditd tool.mp4 |
13.41MB |
003. 27.2 Leveraging the Auditd tool en.srt |
4.76KB |
003. 3.2 Password Management.mp4 |
33.09MB |
003. 3.2 Password Management en.srt |
10.12KB |
003. 4.2 Overview of Network Devices and Hardening.mp4 |
59.26MB |
003. 4.2 Overview of Network Devices and Hardening en.srt |
22.48KB |
003. 5.2 Overview of CIS Controls.mp4 |
26.12MB |
003. 5.2 Overview of CIS Controls en.srt |
8.98KB |
003. 6.2 WPA3 Security.mp4 |
13.73MB |
003. 6.2 WPA3 Security en.srt |
4.77KB |
003. 7.2 CryptoMalware.mp4 |
32.35MB |
003. 7.2 CryptoMalware en.srt |
12.85KB |
003. 8.2 Core Security Strategies.mp4 |
6.34MB |
003. 8.2 Core Security Strategies en.srt |
4.49KB |
003. 9.2 Active Defense Techniques.mp4 |
18.47MB |
003. 9.2 Active Defense Techniques en.srt |
4.80KB |
004. 1.3 Layer 4 Protocols.mp4 |
54.01MB |
004. 1.3 Layer 4 Protocols en.srt |
19.54KB |
004. 10.3 Host-based Intrusion Prevention.mp4 |
13.95MB |
004. 10.3 Host-based Intrusion Prevention en.srt |
3.75KB |
004. 11.3 Logging Analysis Fundamentals.mp4 |
18.68MB |
004. 11.3 Logging Analysis Fundamentals en.srt |
7.11KB |
004. 12.3 Using Xenmap and Yersinia.mp4 |
33.56MB |
004. 12.3 Using Xenmap and Yersinia en.srt |
19.64KB |
004. 13.3 Common Attacks Against Cloud Services.mp4 |
32.78MB |
004. 13.3 Common Attacks Against Cloud Services en.srt |
9.73KB |
004. 14.3 Symmetric Key Cryptography.mp4 |
17.96MB |
004. 14.3 Symmetric Key Cryptography en.srt |
4.65KB |
004. 15.3 SSLTLS.mp4 |
15.19MB |
004. 15.3 SSLTLS en.srt |
3.89KB |
004. 16.3 Acceptable Use Policies.mp4 |
8.83MB |
004. 16.3 Acceptable Use Policies en.srt |
1.91KB |
004. 17.3 Threat Assessment, Analysis, and Reporting.mp4 |
52.50MB |
004. 17.3 Threat Assessment, Analysis, and Reporting en.srt |
17.73KB |
004. 18.3 Conducting a Forensic Investigation.mp4 |
37.57MB |
004. 18.3 Conducting a Forensic Investigation en.srt |
18.28KB |
004. 19.3 Backups and Restoration.mp4 |
20.70MB |
004. 19.3 Backups and Restoration en.srt |
4.29KB |
004. 2.3 Understanding the Enterprise Architecture.mp4 |
5.83MB |
004. 2.3 Understanding the Enterprise Architecture en.srt |
2.49KB |
004. 20.3 Windows-as-a-Service.mp4 |
20.02MB |
004. 20.3 Windows-as-a-Service en.srt |
6.55KB |
004. 21.3 Windows Privileges.mp4 |
17.35MB |
004. 21.3 Windows Privileges en.srt |
6.03KB |
004. 22.3 Administrative Users, AppLocker, and User Account Control.mp4 |
13.75MB |
004. 22.3 Administrative Users, AppLocker, and User Account Control en.srt |
6.98KB |
004. 23.3 Microsoft Azure Active Directory (MAAD).mp4 |
34.02MB |
004. 23.3 Microsoft Azure Active Directory (MAAD) en.srt |
19.87KB |
004. 24.3 Windows Auditing and Forensics.mp4 |
23.88MB |
004. 24.3 Windows Auditing and Forensics en.srt |
11.32KB |
004. 25.3 Linux Shells and Kernels.mp4 |
17.66MB |
004. 25.3 Linux Shells and Kernels en.srt |
9.12KB |
004. 26.3 Linux Kernel Security.mp4 |
25.93MB |
004. 26.3 Linux Kernel Security en.srt |
9.45KB |
004. 27.3 Linux Security Utilities.mp4 |
18.23MB |
004. 27.3 Linux Security Utilities en.srt |
8.70KB |
004. 3.3 Introduction to Password Cracking.mp4 |
37.66MB |
004. 3.3 Introduction to Password Cracking en.srt |
13.89KB |
004. 4.3 Survey of Security Devices and Wireshark.mp4 |
58.09MB |
004. 4.3 Survey of Security Devices and Wireshark en.srt |
21.55KB |
004. 5.3 Samples and Case Studies.mp4 |
25.72MB |
004. 5.3 Samples and Case Studies en.srt |
7.92KB |
004. 6.3 PAN, NFC, and 5G Concepts.mp4 |
15.19MB |
004. 6.3 PAN, NFC, and 5G Concepts en.srt |
5.58KB |
004. 7.3 Defensive Strategies.mp4 |
24.70MB |
004. 7.3 Defensive Strategies en.srt |
13.63KB |
004. 8.3 Defensible Network Architectures.mp4 |
14.61MB |
004. 8.3 Defensible Network Architectures en.srt |
4.16KB |
004. 9.3 Active Defense Tools.mp4 |
34.70MB |
004. 9.3 Active Defense Tools en.srt |
12.57KB |
005. 1.4 Setting up a Lab Environment.mp4 |
36.81MB |
005. 1.4 Setting up a Lab Environment en.srt |
15.93KB |
005. 10.4 Next-generation Endpoint Security Solutions.mp4 |
15.57MB |
005. 10.4 Next-generation Endpoint Security Solutions en.srt |
4.06KB |
005. 11.4 Core SIEM Activities.mp4 |
20.98MB |
005. 11.4 Core SIEM Activities en.srt |
7.34KB |
005. 12.4 Penetration Testing.mp4 |
54.97MB |
005. 12.4 Penetration Testing en.srt |
20.69KB |
005. 13.4 Introduction to Microsoft Azure IAM.mp4 |
42.38MB |
005. 13.4 Introduction to Microsoft Azure IAM en.srt |
16.99KB |
005. 14.4 Asymmetric Key Cryptography.mp4 |
11.12MB |
005. 14.4 Asymmetric Key Cryptography en.srt |
3.81KB |
005. 15.4 Public Key Infrastructure.mp4 |
44.22MB |
005. 15.4 Public Key Infrastructure en.srt |
16.47KB |
005. 16.4 Survey of Sample Policies.mp4 |
40.88MB |
005. 16.4 Survey of Sample Policies en.srt |
13.39KB |
005. 19.4 Disaster Recovery Planning (DRP).mp4 |
39.48MB |
005. 19.4 Disaster Recovery Planning (DRP) en.srt |
11.02KB |
005. 2.4 Introduction to Threat Enumeration.mp4 |
11.00MB |
005. 2.4 Introduction to Threat Enumeration en.srt |
4.22KB |
005. 21.4 Overview of BitLocker Drive Encryption.mp4 |
17.75MB |
005. 21.4 Overview of BitLocker Drive Encryption en.srt |
8.56KB |
005. 25.4 Linux Permissions.mp4 |
26.06MB |
005. 25.4 Linux Permissions en.srt |
13.97KB |
005. 26.4 Linux System Enhancers.mp4 |
21.02MB |
005. 26.4 Linux System Enhancers en.srt |
7.11KB |
005. 4.4 Configuring Firewalls at Amazon Web Services.mp4 |
32.16MB |
005. 4.4 Configuring Firewalls at Amazon Web Services en.srt |
19.32KB |
005. 6.4 The Internet of Things (IoT).mp4 |
19.57MB |
005. 6.4 The Internet of Things (IoT) en.srt |
7.53KB |
006. 1.5 Using tcpdump and Wireshark.mp4 |
25.82MB |
006. 1.5 Using tcpdump and Wireshark en.srt |
10.43KB |
006. 25.5 Linux User Accounts.mp4 |
24.12MB |
006. 25.5 Linux User Accounts en.srt |
11.02KB |
006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp4 |
29.16MB |
006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall en.srt |
17.47KB |
007. 4.6 Examining a Classic IPS Sensor Device.mp4 |
24.04MB |
007. 4.6 Examining a Classic IPS Sensor Device en.srt |
10.26KB |
1 |
397.81KB |
10 |
794.23KB |
100 |
678.50KB |
101 |
177.82KB |
102 |
355.74KB |
103 |
421.33KB |
104 |
375.74KB |
105 |
719.29KB |
106 |
970.76KB |
107 |
989.06KB |
108 |
1007.71KB |
109 |
2.63KB |
11 |
1016.75KB |
110 |
251.67KB |
111 |
299.32KB |
112 |
408.39KB |
113 |
431.24KB |
114 |
447.04KB |
115 |
461.99KB |
116 |
464.59KB |
117 |
514.32KB |
118 |
529.69KB |
119 |
604.60KB |
12 |
834.40KB |
120 |
625.45KB |
121 |
628.50KB |
122 |
640.08KB |
123 |
725.47KB |
124 |
731.27KB |
125 |
790.16KB |
126 |
809.83KB |
127 |
864.61KB |
128 |
883.37KB |
129 |
890.27KB |
13 |
639.66KB |
130 |
947.86KB |
131 |
965.16KB |
132 |
1015.21KB |
133 |
126.15KB |
14 |
122.05KB |
15 |
313.19KB |
16 |
535.88KB |
17 |
347.78KB |
18 |
417.78KB |
19 |
440.34KB |
2 |
988.72KB |
20 |
197.80KB |
21 |
210.86KB |
22 |
303.88KB |
23 |
1000.81KB |
24 |
454.79KB |
25 |
933.99KB |
26 |
223.93KB |
27 |
668.52KB |
28 |
861.46KB |
29 |
992.17KB |
3 |
423.25KB |
30 |
1011.17KB |
31 |
192.84KB |
32 |
1017.71KB |
33 |
257.42KB |
34 |
864.16KB |
35 |
882.52KB |
36 |
322.95KB |
37 |
571.64KB |
38 |
10.86KB |
39 |
192.24KB |
4 |
762.86KB |
40 |
303.36KB |
41 |
896.62KB |
42 |
966.71KB |
43 |
68.63KB |
44 |
188.37KB |
45 |
219.53KB |
46 |
283.16KB |
47 |
428.16KB |
48 |
453.84KB |
49 |
839.84KB |
5 |
935.24KB |
50 |
128.27KB |
51 |
307.85KB |
52 |
898.45KB |
53 |
987.92KB |
54 |
121.50KB |
55 |
333.44KB |
56 |
684.31KB |
57 |
1003.22KB |
58 |
18.68KB |
59 |
38.30KB |
6 |
25.74KB |
60 |
304.48KB |
61 |
1005.18KB |
62 |
419.24KB |
63 |
440.63KB |
64 |
1010.23KB |
65 |
329.35KB |
66 |
539.01KB |
67 |
783.45KB |
68 |
796.62KB |
69 |
37.31KB |
7 |
1011.62KB |
70 |
254.12KB |
71 |
344.08KB |
72 |
666.46KB |
73 |
394.07KB |
74 |
492.82KB |
75 |
159.37KB |
76 |
404.52KB |
77 |
437.98KB |
78 |
824.77KB |
79 |
828.27KB |
8 |
561.93KB |
80 |
194.28KB |
81 |
400.76KB |
82 |
625.45KB |
83 |
902.93KB |
84 |
49.22KB |
85 |
257.36KB |
86 |
273.30KB |
87 |
607.59KB |
88 |
621.03KB |
89 |
958.01KB |
9 |
513.33KB |
90 |
38.20KB |
91 |
68.13KB |
92 |
187.80KB |
93 |
896.99KB |
94 |
3.02KB |
95 |
241.30KB |
96 |
415.34KB |
97 |
812.79KB |
98 |
170.83KB |
99 |
455.61KB |
TutsNode.net.txt |
63B |