Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
41B |
001 Common Networking Devices.en.srt |
3.94KB |
001 Common Networking Devices.mp4 |
10.17MB |
001 Section Introduction.en.srt |
4.54KB |
001 Section Introduction.mp4 |
14.41MB |
001 What is Cybersecurity_.en.srt |
4.81KB |
001 What is Cybersecurity_.mp4 |
20.93MB |
001 Who is a penetration Tester.en.srt |
7.95KB |
001 Who is a penetration Tester.mp4 |
37.94MB |
002 Introduction To Cryptography.en.srt |
8.74KB |
002 Introduction To Cryptography.mp4 |
21.22MB |
002 NIC.en.srt |
3.20KB |
002 NIC.mp4 |
12.16MB |
002 Types of Security.en.srt |
7.00KB |
002 Types of Security.mp4 |
22.42MB |
002 Who is an Information Security Analyst.en.srt |
7.77KB |
002 Who is an Information Security Analyst.mp4 |
37.61MB |
003 History of Cybersecurity.en.srt |
10.86KB |
003 History of Cybersecurity.mp4 |
26.98MB |
003 Hub.en.srt |
5.01KB |
003 Hub.mp4 |
14.56MB |
003 Types of Encryptions.en.srt |
10.16KB |
003 Types of Encryptions.mp4 |
36.96MB |
003 Who is a Security Auditor.en.srt |
6.73KB |
003 Who is a Security Auditor.mp4 |
35.67MB |
004 Bridge.en.srt |
3.40KB |
004 Bridge.mp4 |
10.61MB |
004 Have you heard of a CISO.en.srt |
4.72KB |
004 Have you heard of a CISO.mp4 |
26.14MB |
004 Key Terms in Cybersecurity.en.srt |
11.10KB |
004 Key Terms in Cybersecurity.mp4 |
31.06MB |
004 Types of Ciphers.en.srt |
9.86KB |
004 Types of Ciphers.mp4 |
40.28MB |
005 Router.en.srt |
7.09KB |
005 Router.mp4 |
28.78MB |
005 What are Vulnerability Assessments.en.srt |
10.71KB |
005 What are Vulnerability Assessments.mp4 |
37.22MB |
005 What is Symmetric Encryption.en.srt |
10.23KB |
005 What is Symmetric Encryption.mp4 |
41.43MB |
006 Examples of Symmetric Encryption.en.srt |
8.72KB |
006 Examples of Symmetric Encryption.mp4 |
33.27MB |
006 Firewalls.en.srt |
6.13KB |
006 Firewalls.mp4 |
20.22MB |
006 Importance of Vulnerability Assessments.en.srt |
5.12KB |
006 Importance of Vulnerability Assessments.mp4 |
16.42MB |
007 10 Steps of Vulnerability Assessments.en.srt |
12.69KB |
007 10 Steps of Vulnerability Assessments.mp4 |
36.53MB |
007 IDS IPS HIDS.en.srt |
6.25KB |
007 IDS IPS HIDS.mp4 |
13.49MB |
007 What is Aysmmetric Encryption.en.srt |
7.81KB |
007 What is Aysmmetric Encryption.mp4 |
30.15MB |
008 Access Points.en.srt |
4.00KB |
008 Access Points.mp4 |
13.07MB |
008 Need for Cybersecurity.en.srt |
9.30KB |
008 Need for Cybersecurity.mp4 |
27.37MB |
008 Working of Aysmmetric Algorithm.en.srt |
5.02KB |
008 Working of Aysmmetric Algorithm.mp4 |
17.29MB |
009 Diffie Hellman Key Exchange Algorithm.en.srt |
8.28KB |
009 Diffie Hellman Key Exchange Algorithm.mp4 |
31.19MB |
009 Organizations in Information Security.en.srt |
9.47KB |
009 Organizations in Information Security.mp4 |
41.27MB |
009 Wireless Range Extender.en.srt |
3.06KB |
009 Wireless Range Extender.mp4 |
10.18MB |
010 CSMA CA Working.en.srt |
4.83KB |
010 CSMA CA Working.mp4 |
12.18MB |
010 What is Hashing.en.srt |
5.28KB |
010 What is Hashing.mp4 |
18.32MB |
011 Calculating hashes online.en.srt |
5.95KB |
011 Calculating hashes online.mp4 |
36.74MB |
011 CSMA CD Introduction.en.srt |
2.04KB |
011 CSMA CD Introduction.mp4 |
7.44MB |
012 CSMA CD Working.en.srt |
4.24KB |
012 CSMA CD Working.mp4 |
14.84MB |
012 What is a Digital Signature.en.srt |
6.34KB |
012 What is a Digital Signature.mp4 |
23.44MB |
013 Introduction to DHCP Server.en.srt |
4.06KB |
013 Introduction to DHCP Server.mp4 |
14.59MB |
013 Working of Digital Signatures.en.srt |
6.77KB |
013 Working of Digital Signatures.mp4 |
23.79MB |
014 DHCP Operations.en.srt |
6.27KB |
014 DHCP Operations.mp4 |
22.35MB |
014 What is Secure sockets Layer Protocol.en.srt |
4.42KB |
014 What is Secure sockets Layer Protocol.mp4 |
19.90MB |
015 Other Devices.en.srt |
1.84KB |
015 Other Devices.mp4 |
5.42MB |
015 What is a certificate authority.en.srt |
4.11KB |
015 What is a certificate authority.mp4 |
12.35MB |
016 Multilayer Switch and Load Balancer.en.srt |
4.69KB |
016 Multilayer Switch and Load Balancer.mp4 |
18.36MB |
017 Introduction to DNS Server.en.srt |
5.48KB |
017 Introduction to DNS Server.mp4 |
25.19MB |
018 DNS Record Types.en.srt |
8.11KB |
018 DNS Record Types.mp4 |
41.21MB |
019 Types of DNS Servers.en.srt |
4.46KB |
019 Types of DNS Servers.mp4 |
11.34MB |
020 Proxy Servers.en.srt |
7.39KB |
020 Proxy Servers.mp4 |
30.90MB |
021 Encryption Devices.en.srt |
3.52KB |
021 Encryption Devices.mp4 |
9.35MB |
022 Analog Modems, Packet Shaper and VPN Concentrator.en.srt |
4.59KB |
022 Analog Modems, Packet Shaper and VPN Concentrator.mp4 |
10.96MB |
023 Media Converters and Next Generation Firewalls.en.srt |
3.18KB |
023 Media Converters and Next Generation Firewalls.mp4 |
9.75MB |
024 Benefits of Routers.en.srt |
2.28KB |
024 Benefits of Routers.mp4 |
6.40MB |
025 Quick Recap.en.srt |
4.84KB |
025 Quick Recap.mp4 |
12.25MB |
1 |
246B |
10 |
340.24KB |
11 |
240.23KB |
12 |
320.48KB |
13 |
452.69KB |
14 |
105.65KB |
15 |
359.23KB |
16 |
221.54KB |
17 |
134.38KB |
18 |
19.46KB |
19 |
365.24KB |
2 |
269.16KB |
20 |
318.03KB |
21 |
215.98KB |
22 |
57.27KB |
23 |
85.48KB |
24 |
150.92KB |
25 |
290.82KB |
26 |
70.61KB |
27 |
289.57KB |
28 |
104.72KB |
29 |
142.51KB |
3 |
221.01KB |
30 |
181.51KB |
31 |
217.06KB |
32 |
77.72KB |
33 |
159.49KB |
34 |
422.49KB |
35 |
451.18KB |
36 |
92.92KB |
37 |
7.50KB |
38 |
436.22KB |
39 |
150.96KB |
4 |
59.96KB |
40 |
252.99KB |
41 |
323.95KB |
42 |
345.53KB |
43 |
164.35KB |
44 |
42.01KB |
45 |
398.39KB |
46 |
326.15KB |
47 |
336.80KB |
48 |
251.01KB |
49 |
156.65KB |
5 |
399.51KB |
50 |
56.78KB |
51 |
106.65KB |
6 |
282.58KB |
7 |
44.04KB |
8 |
267.94KB |
9 |
477.55KB |
TutsNode.com.txt |
63B |