Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
189.91KB |
1 |
154.91KB |
1.1 1.Contrast & Compare Information Security Roles - CompTIA Security+ Attacks, Threats and Vulnerabilities.pdf |
5.36MB |
1.1 1.Encryption, Cryptography it's types and Cryptographic algorithms.pdf |
5.20MB |
1.1 Incident Management.pdf |
2.75MB |
1.1 Information Security Governance.pdf |
3.80MB |
1. Compare and Contrast Information Security Roles.mp4 |
65.00MB |
1. Encryption, Cryptography, types of Cryptography and Cryptographic algorithms.mp4 |
204.81MB |
1. Incident Management.mp4 |
50.66MB |
1. Information Security Governance.mp4 |
54.42MB |
1. Penetration Testing Concepts.mp4 |
105.74MB |
1. Wireless Networks & Security Controls.mp4 |
149.29MB |
10 |
119.75KB |
11 |
8.59KB |
12 |
492.57KB |
13 |
636.19KB |
14 |
802.28KB |
15 |
894.37KB |
16 |
362.28KB |
17 |
784.46KB |
18 |
37.37KB |
19 |
807.24KB |
2 |
124.86KB |
2.1 11. Identity Management Controls.pdf |
2.40MB |
2.1 2.Compare and Contrast Security Controls and Framework Types.pdf |
3.22MB |
2.1 2. Digital Signatures & Digital Certificates.pdf |
986.03KB |
2.1 8.Penetration Testing Concepts in detail.pdf |
9.78MB |
2.1 Digital Forensics.pdf |
2.61MB |
2.1 Information Security Programs.pdf |
4.79MB |
2.2 How To Use (And Not Use) The NIST CSF.html |
123B |
2. Compare and Contrast Security Controls and Framework Types.mp4 |
90.52MB |
2. Digital Forensics.mp4 |
51.15MB |
2. Digital Signatures & Digital Certificates.mp4 |
94.99MB |
2. Identity Management Controls.mp4 |
90.22MB |
2. Information gathering.mp4 |
88.13MB |
2. Information Security programs.mp4 |
96.61MB |
20 |
418.70KB |
21 |
126.83KB |
22 |
595.78KB |
23 |
746.31KB |
24 |
32.31KB |
25 |
866.40KB |
26 |
351.95KB |
27 |
833.68KB |
28 |
533.62KB |
29 |
604.03KB |
3 |
276.37KB |
3.1 3. Digital certificate Authorities.pdf |
953.66KB |
3.1 3.Types of Threat Actors and Attack Vectors.pdf |
5.30MB |
3.1 Cloud, Virtualization, BYOD and Security Testing.pdf |
8.16MB |
3.1 Risk Management.pdf |
5.52MB |
3. Cloud, Virtualization, BYOD & Security Testing.mp4 |
125.73MB |
3. Digital Certificate Authorities.mp4 |
43.19MB |
3. Risk Management.mp4 |
54.88MB |
3. Scanning.mp4 |
40.05MB |
3. Types of Threat Actors and Attack Vectors.mp4 |
68.65MB |
30 |
15.13KB |
31 |
148.11KB |
32 |
493.24KB |
33 |
991.11KB |
34 |
51.40KB |
35 |
226.32KB |
36 |
855.05KB |
37 |
494.87KB |
38 |
656.54KB |
39 |
718.93KB |
4 |
56.18KB |
4.1 4. Public Key Infrastructure - PKI.pdf |
3.48MB |
4.1 4.Threat Intelligence & Threat research Sources.pdf |
602.94KB |
4.1 Implementing Personnel Policies.pdf |
2.34MB |
4. Exploitation.mp4 |
17.52MB |
4. Implementing Personnel Policies.mp4 |
54.27MB |
4. Public Key Infastructure.mp4 |
52.97MB |
4. Threat Intelligence & Threat Research.mp4 |
95.88MB |
40 |
821.02KB |
41 |
124.64KB |
42 |
200.59KB |
43 |
214.42KB |
44 |
497.39KB |
45 |
203.05KB |
46 |
476.54KB |
47 |
528.75KB |
48 |
802.79KB |
49 |
223.32KB |
5 |
287.93KB |
5.1 12.Implementing Account Policies & Authorization Solutions.pdf |
1.23MB |
5.1 5. Commands used in Assessing Network layout & Security.pdf |
793.42KB |
5.1 5. PKI Management.pdf |
3.53MB |
5. Account Policies & Authorization.mp4 |
40.41MB |
5. Commands used in Assessing Network layout & Security.mp4 |
105.95MB |
5. PKI Management.mp4 |
102.56MB |
5. Post Exploitation Maintaining access.mp4 |
41.48MB |
50 |
256.48KB |
51 |
395.54KB |
52 |
447.75KB |
53 |
612.77KB |
54 |
679.99KB |
55 |
323.33KB |
6 |
52.13KB |
6.1 6.Identification, Authentication & Access Control Systems.pdf |
1.68MB |
6.1 6. Security concerns regarding Vulnerabilities.pdf |
2.56MB |
6. Identification, Authentication & Access Control Systems.mp4 |
33.86MB |
6. Reporting.mp4 |
12.95MB |
6. Security concerns regarding Vulnerabilities.mp4 |
62.21MB |
7 |
270.15KB |
7.1 7.Vulnerability Scanning Techniques and Vulnerability scores & exposures.pdf |
2.78MB |
7. Knowledge based Authentication.mp4 |
113.72MB |
7. Vulnerability Scanning Techniques and Vulnerability scores & exposures.mp4 |
58.59MB |
8 |
448.66KB |
8.1 8. Technology implementing Secure Authentication.pdf |
4.88MB |
8.1 9.Social Engineering Attacks & Principles.pdf |
4.80MB |
8. Social Engineering Attacks & Principles.mp4 |
123.17MB |
8. Technology behind Secure Authentication.mp4 |
90.38MB |
9 |
403.61KB |
9.1 10.Malware and Types of malwares.pdf |
4.51MB |
9.1 9. Biometric Authentication Concepts.pdf |
15.03MB |
9. Biometric Authentication.mp4 |
175.85MB |
9. Malware and Types of malwares.mp4 |
65.23MB |
TutsNode.net.txt |
63B |