Torrent Info
Title GIAC Security Essentials GSEC
Category
Size 2.85GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 195B
001. GIAC Security Essentials (GSEC) Introduction.mp4 9.21MB
001. GIAC Security Essentials (GSEC) Introduction en.srt 1.84KB
001. GIAC Security Essentials (GSEC) Summary.mp4 6.56MB
001. GIAC Security Essentials (GSEC) Summary en.srt 1.59KB
001. Learning objectives.mp4 3.63MB
001. Learning objectives.mp4 3.02MB
001. Learning objectives.mp4 3.00MB
001. Learning objectives.mp4 2.75MB
001. Learning objectives.mp4 2.71MB
001. Learning objectives.mp4 2.60MB
001. Learning objectives.mp4 2.58MB
001. Learning objectives.mp4 2.56MB
001. Learning objectives.mp4 2.55MB
001. Learning objectives.mp4 2.50MB
001. Learning objectives.mp4 2.48MB
001. Learning objectives.mp4 2.41MB
001. Learning objectives.mp4 2.39MB
001. Learning objectives.mp4 2.39MB
001. Learning objectives.mp4 2.37MB
001. Learning objectives.mp4 2.29MB
001. Learning objectives.mp4 2.29MB
001. Learning objectives.mp4 2.23MB
001. Learning objectives.mp4 2.21MB
001. Learning objectives.mp4 2.16MB
001. Learning objectives.mp4 2.14MB
001. Learning objectives.mp4 2.13MB
001. Learning objectives.mp4 2.07MB
001. Learning objectives.mp4 2.06MB
001. Learning objectives.mp4 2.01MB
001. Learning objectives.mp4 1.88MB
001. Learning objectives.mp4 1.86MB
001. Learning objectives en.srt 538B
001. Learning objectives en.srt 492B
001. Learning objectives en.srt 299B
001. Learning objectives en.srt 681B
001. Learning objectives en.srt 400B
001. Learning objectives en.srt 411B
001. Learning objectives en.srt 399B
001. Learning objectives en.srt 402B
001. Learning objectives en.srt 334B
001. Learning objectives en.srt 488B
001. Learning objectives en.srt 423B
001. Learning objectives en.srt 501B
001. Learning objectives en.srt 560B
001. Learning objectives en.srt 567B
001. Learning objectives en.srt 495B
001. Learning objectives en.srt 494B
001. Learning objectives en.srt 485B
001. Learning objectives en.srt 437B
001. Learning objectives en.srt 424B
001. Learning objectives en.srt 411B
001. Learning objectives en.srt 408B
001. Learning objectives en.srt 400B
001. Learning objectives en.srt 383B
001. Learning objectives en.srt 381B
001. Learning objectives en.srt 357B
001. Learning objectives en.srt 357B
001. Learning objectives en.srt 331B
001. Module introduction.mp4 4.65MB
001. Module introduction.mp4 4.59MB
001. Module introduction.mp4 3.30MB
001. Module introduction.mp4 3.05MB
001. Module introduction.mp4 3.03MB
001. Module introduction.mp4 2.55MB
001. Module introduction en.srt 978B
001. Module introduction en.srt 956B
001. Module introduction en.srt 665B
001. Module introduction en.srt 648B
001. Module introduction en.srt 586B
001. Module introduction en.srt 576B
002. 1.1 Network Protocols and Reference Models.mp4 29.75MB
002. 1.1 Network Protocols and Reference Models en.srt 8.17KB
002. 10.1 Overview of Endpoint Security.mp4 23.67MB
002. 10.1 Overview of Endpoint Security en.srt 6.31KB
002. 11.1 Overview of Logging.mp4 30.01MB
002. 11.1 Overview of Logging en.srt 12.04KB
002. 12.1 Overview of Vulnerability Management.mp4 35.79MB
002. 12.1 Overview of Vulnerability Management en.srt 9.15KB
002. 13.1 Overview of Virtualization and VM Security.mp4 26.99MB
002. 13.1 Overview of Virtualization and VM Security en.srt 7.99KB
002. 14.1 Overview of Cryptology and Cryptosystems.mp4 26.81MB
002. 14.1 Overview of Cryptology and Cryptosystems en.srt 7.48KB
002. 15.1 Digital Signatures.mp4 14.12MB
002. 15.1 Digital Signatures en.srt 6.29KB
002. 16.1 The Importance of Written Security Policies.mp4 18.22MB
002. 16.1 The Importance of Written Security Policies en.srt 4.70KB
002. 17.1 Overview of Risk Management.mp4 31.81MB
002. 17.1 Overview of Risk Management en.srt 8.66KB
002. 18.1 Fundamentals of Incident Handling.mp4 14.81MB
002. 18.1 Fundamentals of Incident Handling en.srt 4.39KB
002. 19.1 Business Continuity Planning (BCP).mp4 25.79MB
002. 19.1 Business Continuity Planning (BCP) en.srt 7.65KB
002. 2.1 CIA Triad and Parkerian Hexad.mp4 10.59MB
002. 2.1 CIA Triad and Parkerian Hexad en.srt 4.11KB
002. 20.1 Operating Systems and Services.mp4 13.39MB
002. 20.1 Operating Systems and Services en.srt 6.45KB
002. 21.1 NTFS and Shared Folder Permissions.mp4 14.39MB
002. 21.1 NTFS and Shared Folder Permissions en.srt 7.47KB
002. 22.1 Security Templates and SCA Snap-in.mp4 15.84MB
002. 22.1 Security Templates and SCA Snap-in en.srt 8.83KB
002. 23.1 Azure and High Availability.mp4 28.68MB
002. 23.1 Azure and High Availability en.srt 16.09KB
002. 24.1 Windows PowerShell.mp4 37.59MB
002. 24.1 Windows PowerShell en.srt 13.44KB
002. 25.1 Comparing Linux Operating Systems.mp4 26.70MB
002. 25.1 Comparing Linux Operating Systems en.srt 9.83KB
002. 26.1 Starting Services at Boot Time.mp4 28.44MB
002. 26.1 Starting Services at Boot Time en.srt 11.10KB
002. 27.1 Configuring and Monitoring Logs.mp4 21.33MB
002. 27.1 Configuring and Monitoring Logs en.srt 8.77KB
002. 3.1 Access Control Concepts.mp4 84.39MB
002. 3.1 Access Control Concepts en.srt 25.65KB
002. 4.1 Network Topologies and Zones.mp4 29.14MB
002. 4.1 Network Topologies and Zones en.srt 13.03KB
002. 5.1 Introducing the Center for Internet Security (CIS).mp4 19.59MB
002. 5.1 Introducing the Center for Internet Security (CIS) en.srt 4.79KB
002. 6.1 The Evolution of IEEE 802.11 Security.mp4 60.59MB
002. 6.1 The Evolution of IEEE 802.11 Security en.srt 16.35KB
002. 7.1 Common Attack Types.mp4 71.03MB
002. 7.1 Common Attack Types en.srt 25.34KB
002. 8.1 Defense in Depth Overview and Strategies.mp4 20.96MB
002. 8.1 Defense in Depth Overview and Strategies en.srt 6.96KB
002. 9.1 Overview of Active Defense.mp4 19.01MB
002. 9.1 Overview of Active Defense en.srt 7.83KB
003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4 53.45MB
003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6 en.srt 17.53KB
003. 10.2 Host-based Intrusion Detection.mp4 11.82MB
003. 10.2 Host-based Intrusion Detection en.srt 2.87KB
003. 11.2 Logging System Setup and Configuration.mp4 15.60MB
003. 11.2 Logging System Setup and Configuration en.srt 4.72KB
003. 12.2 Network Scanning.mp4 40.69MB
003. 12.2 Network Scanning en.srt 12.75KB
003. 13.2 Cloud Models and Value Proposition.mp4 74.20MB
003. 13.2 Cloud Models and Value Proposition en.srt 23.29KB
003. 14.2 Cryptographic Hashing.mp4 25.56MB
003. 14.2 Cryptographic Hashing en.srt 9.40KB
003. 15.2 IPsec.mp4 44.01MB
003. 15.2 IPsec en.srt 17.92KB
003. 16.2 Standards, Guidelines, and Procedures.mp4 16.62MB
003. 16.2 Standards, Guidelines, and Procedures en.srt 4.32KB
003. 17.2 Risk Management Best Practices.mp4 32.03MB
003. 17.2 Risk Management Best Practices en.srt 10.42KB
003. 18.2 Six Step Incident Response Process.mp4 32.01MB
003. 18.2 Six Step Incident Response Process en.srt 8.60KB
003. 19.2 Business Impact Analysis (BIA).mp4 10.76MB
003. 19.2 Business Impact Analysis (BIA) en.srt 3.62KB
003. 2.2 Categories and Types of Controls.mp4 25.18MB
003. 2.2 Categories and Types of Controls en.srt 6.50KB
003. 20.2 Windows Workgroups vs. Domains.mp4 25.58MB
003. 20.2 Windows Workgroups vs. Domains en.srt 15.29KB
003. 21.2 Registry Keys and REGEDIT.EXE.mp4 11.93MB
003. 21.2 Registry Keys and REGEDIT.EXE en.srt 6.13KB
003. 22.2 Understanding Group Policy Objects.mp4 13.06MB
003. 22.2 Understanding Group Policy Objects en.srt 8.20KB
003. 23.2 Configuring Azure VM Attributes.mp4 24.87MB
003. 23.2 Configuring Azure VM Attributes en.srt 13.17KB
003. 24.2 Administrative Tools and Utilities.mp4 43.19MB
003. 24.2 Administrative Tools and Utilities en.srt 12.89KB
003. 25.2 Mobile Device Security.mp4 11.96MB
003. 25.2 Mobile Device Security en.srt 6.40KB
003. 26.2 Configuration Management Tools.mp4 16.52MB
003. 26.2 Configuration Management Tools en.srt 7.98KB
003. 27.2 Leveraging the Auditd tool.mp4 13.41MB
003. 27.2 Leveraging the Auditd tool en.srt 4.76KB
003. 3.2 Password Management.mp4 33.09MB
003. 3.2 Password Management en.srt 10.12KB
003. 4.2 Overview of Network Devices and Hardening.mp4 59.26MB
003. 4.2 Overview of Network Devices and Hardening en.srt 22.48KB
003. 5.2 Overview of CIS Controls.mp4 26.12MB
003. 5.2 Overview of CIS Controls en.srt 8.98KB
003. 6.2 WPA3 Security.mp4 13.73MB
003. 6.2 WPA3 Security en.srt 4.77KB
003. 7.2 CryptoMalware.mp4 32.35MB
003. 7.2 CryptoMalware en.srt 12.85KB
003. 8.2 Core Security Strategies.mp4 6.34MB
003. 8.2 Core Security Strategies en.srt 4.49KB
003. 9.2 Active Defense Techniques.mp4 18.47MB
003. 9.2 Active Defense Techniques en.srt 4.80KB
004. 1.3 Layer 4 Protocols.mp4 54.01MB
004. 1.3 Layer 4 Protocols en.srt 19.54KB
004. 10.3 Host-based Intrusion Prevention.mp4 13.95MB
004. 10.3 Host-based Intrusion Prevention en.srt 3.75KB
004. 11.3 Logging Analysis Fundamentals.mp4 18.68MB
004. 11.3 Logging Analysis Fundamentals en.srt 7.11KB
004. 12.3 Using Xenmap and Yersinia.mp4 33.56MB
004. 12.3 Using Xenmap and Yersinia en.srt 19.64KB
004. 13.3 Common Attacks Against Cloud Services.mp4 32.78MB
004. 13.3 Common Attacks Against Cloud Services en.srt 9.73KB
004. 14.3 Symmetric Key Cryptography.mp4 17.96MB
004. 14.3 Symmetric Key Cryptography en.srt 4.65KB
004. 15.3 SSLTLS.mp4 15.19MB
004. 15.3 SSLTLS en.srt 3.89KB
004. 16.3 Acceptable Use Policies.mp4 8.83MB
004. 16.3 Acceptable Use Policies en.srt 1.91KB
004. 17.3 Threat Assessment, Analysis, and Reporting.mp4 52.50MB
004. 17.3 Threat Assessment, Analysis, and Reporting en.srt 17.73KB
004. 18.3 Conducting a Forensic Investigation.mp4 37.57MB
004. 18.3 Conducting a Forensic Investigation en.srt 18.28KB
004. 19.3 Backups and Restoration.mp4 20.70MB
004. 19.3 Backups and Restoration en.srt 4.29KB
004. 2.3 Understanding the Enterprise Architecture.mp4 5.83MB
004. 2.3 Understanding the Enterprise Architecture en.srt 2.49KB
004. 20.3 Windows-as-a-Service.mp4 20.02MB
004. 20.3 Windows-as-a-Service en.srt 6.55KB
004. 21.3 Windows Privileges.mp4 17.35MB
004. 21.3 Windows Privileges en.srt 6.03KB
004. 22.3 Administrative Users, AppLocker, and User Account Control.mp4 13.75MB
004. 22.3 Administrative Users, AppLocker, and User Account Control en.srt 6.98KB
004. 23.3 Microsoft Azure Active Directory (MAAD).mp4 34.02MB
004. 23.3 Microsoft Azure Active Directory (MAAD) en.srt 19.87KB
004. 24.3 Windows Auditing and Forensics.mp4 23.88MB
004. 24.3 Windows Auditing and Forensics en.srt 11.32KB
004. 25.3 Linux Shells and Kernels.mp4 17.66MB
004. 25.3 Linux Shells and Kernels en.srt 9.12KB
004. 26.3 Linux Kernel Security.mp4 25.93MB
004. 26.3 Linux Kernel Security en.srt 9.45KB
004. 27.3 Linux Security Utilities.mp4 18.23MB
004. 27.3 Linux Security Utilities en.srt 8.70KB
004. 3.3 Introduction to Password Cracking.mp4 37.66MB
004. 3.3 Introduction to Password Cracking en.srt 13.89KB
004. 4.3 Survey of Security Devices and Wireshark.mp4 58.09MB
004. 4.3 Survey of Security Devices and Wireshark en.srt 21.55KB
004. 5.3 Samples and Case Studies.mp4 25.72MB
004. 5.3 Samples and Case Studies en.srt 7.92KB
004. 6.3 PAN, NFC, and 5G Concepts.mp4 15.19MB
004. 6.3 PAN, NFC, and 5G Concepts en.srt 5.58KB
004. 7.3 Defensive Strategies.mp4 24.70MB
004. 7.3 Defensive Strategies en.srt 13.63KB
004. 8.3 Defensible Network Architectures.mp4 14.61MB
004. 8.3 Defensible Network Architectures en.srt 4.16KB
004. 9.3 Active Defense Tools.mp4 34.70MB
004. 9.3 Active Defense Tools en.srt 12.57KB
005. 1.4 Setting up a Lab Environment.mp4 36.81MB
005. 1.4 Setting up a Lab Environment en.srt 15.93KB
005. 10.4 Next-generation Endpoint Security Solutions.mp4 15.57MB
005. 10.4 Next-generation Endpoint Security Solutions en.srt 4.06KB
005. 11.4 Core SIEM Activities.mp4 20.98MB
005. 11.4 Core SIEM Activities en.srt 7.34KB
005. 12.4 Penetration Testing.mp4 54.97MB
005. 12.4 Penetration Testing en.srt 20.69KB
005. 13.4 Introduction to Microsoft Azure IAM.mp4 42.38MB
005. 13.4 Introduction to Microsoft Azure IAM en.srt 16.99KB
005. 14.4 Asymmetric Key Cryptography.mp4 11.12MB
005. 14.4 Asymmetric Key Cryptography en.srt 3.81KB
005. 15.4 Public Key Infrastructure.mp4 44.22MB
005. 15.4 Public Key Infrastructure en.srt 16.47KB
005. 16.4 Survey of Sample Policies.mp4 40.88MB
005. 16.4 Survey of Sample Policies en.srt 13.39KB
005. 19.4 Disaster Recovery Planning (DRP).mp4 39.48MB
005. 19.4 Disaster Recovery Planning (DRP) en.srt 11.02KB
005. 2.4 Introduction to Threat Enumeration.mp4 11.00MB
005. 2.4 Introduction to Threat Enumeration en.srt 4.22KB
005. 21.4 Overview of BitLocker Drive Encryption.mp4 17.75MB
005. 21.4 Overview of BitLocker Drive Encryption en.srt 8.56KB
005. 25.4 Linux Permissions.mp4 26.06MB
005. 25.4 Linux Permissions en.srt 13.97KB
005. 26.4 Linux System Enhancers.mp4 21.02MB
005. 26.4 Linux System Enhancers en.srt 7.11KB
005. 4.4 Configuring Firewalls at Amazon Web Services.mp4 32.16MB
005. 4.4 Configuring Firewalls at Amazon Web Services en.srt 19.32KB
005. 6.4 The Internet of Things (IoT).mp4 19.57MB
005. 6.4 The Internet of Things (IoT) en.srt 7.53KB
006. 1.5 Using tcpdump and Wireshark.mp4 25.82MB
006. 1.5 Using tcpdump and Wireshark en.srt 10.43KB
006. 25.5 Linux User Accounts.mp4 24.12MB
006. 25.5 Linux User Accounts en.srt 11.02KB
006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp4 29.16MB
006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall en.srt 17.47KB
007. 4.6 Examining a Classic IPS Sensor Device.mp4 24.04MB
007. 4.6 Examining a Classic IPS Sensor Device en.srt 10.26KB
1 397.81KB
10 794.23KB
100 678.50KB
101 177.82KB
102 355.74KB
103 421.33KB
104 375.74KB
105 719.29KB
106 970.76KB
107 989.06KB
108 1007.71KB
109 2.63KB
11 1016.75KB
110 251.67KB
111 299.32KB
112 408.39KB
113 431.24KB
114 447.04KB
115 461.99KB
116 464.59KB
117 514.32KB
118 529.69KB
119 604.60KB
12 834.40KB
120 625.45KB
121 628.50KB
122 640.08KB
123 725.47KB
124 731.27KB
125 790.16KB
126 809.83KB
127 864.61KB
128 883.37KB
129 890.27KB
13 639.66KB
130 947.86KB
131 965.16KB
132 1015.21KB
133 126.15KB
14 122.05KB
15 313.19KB
16 535.88KB
17 347.78KB
18 417.78KB
19 440.34KB
2 988.72KB
20 197.80KB
21 210.86KB
22 303.88KB
23 1000.81KB
24 454.79KB
25 933.99KB
26 223.93KB
27 668.52KB
28 861.46KB
29 992.17KB
3 423.25KB
30 1011.17KB
31 192.84KB
32 1017.71KB
33 257.42KB
34 864.16KB
35 882.52KB
36 322.95KB
37 571.64KB
38 10.86KB
39 192.24KB
4 762.86KB
40 303.36KB
41 896.62KB
42 966.71KB
43 68.63KB
44 188.37KB
45 219.53KB
46 283.16KB
47 428.16KB
48 453.84KB
49 839.84KB
5 935.24KB
50 128.27KB
51 307.85KB
52 898.45KB
53 987.92KB
54 121.50KB
55 333.44KB
56 684.31KB
57 1003.22KB
58 18.68KB
59 38.30KB
6 25.74KB
60 304.48KB
61 1005.18KB
62 419.24KB
63 440.63KB
64 1010.23KB
65 329.35KB
66 539.01KB
67 783.45KB
68 796.62KB
69 37.31KB
7 1011.62KB
70 254.12KB
71 344.08KB
72 666.46KB
73 394.07KB
74 492.82KB
75 159.37KB
76 404.52KB
77 437.98KB
78 824.77KB
79 828.27KB
8 561.93KB
80 194.28KB
81 400.76KB
82 625.45KB
83 902.93KB
84 49.22KB
85 257.36KB
86 273.30KB
87 607.59KB
88 621.03KB
89 958.01KB
9 513.33KB
90 38.20KB
91 68.13KB
92 187.80KB
93 896.99KB
94 3.02KB
95 241.30KB
96 415.34KB
97 812.79KB
98 170.83KB
99 455.61KB
TutsNode.net.txt 63B
Distribution statistics by country
Total 0
IP List List of IP addresses which were distributed this torrent