Torrent Info
Title Core Cyber Security Concepts
Category
Size 2.79GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 189.91KB
1 154.91KB
1.1 1.Contrast & Compare Information Security Roles - CompTIA Security+ Attacks, Threats and Vulnerabilities.pdf 5.36MB
1.1 1.Encryption, Cryptography it's types and Cryptographic algorithms.pdf 5.20MB
1.1 Incident Management.pdf 2.75MB
1.1 Information Security Governance.pdf 3.80MB
1. Compare and Contrast Information Security Roles.mp4 65.00MB
1. Encryption, Cryptography, types of Cryptography and Cryptographic algorithms.mp4 204.81MB
1. Incident Management.mp4 50.66MB
1. Information Security Governance.mp4 54.42MB
1. Penetration Testing Concepts.mp4 105.74MB
1. Wireless Networks & Security Controls.mp4 149.29MB
10 119.75KB
11 8.59KB
12 492.57KB
13 636.19KB
14 802.28KB
15 894.37KB
16 362.28KB
17 784.46KB
18 37.37KB
19 807.24KB
2 124.86KB
2.1 11. Identity Management Controls.pdf 2.40MB
2.1 2.Compare and Contrast Security Controls and Framework Types.pdf 3.22MB
2.1 2. Digital Signatures & Digital Certificates.pdf 986.03KB
2.1 8.Penetration Testing Concepts in detail.pdf 9.78MB
2.1 Digital Forensics.pdf 2.61MB
2.1 Information Security Programs.pdf 4.79MB
2.2 How To Use (And Not Use) The NIST CSF.html 123B
2. Compare and Contrast Security Controls and Framework Types.mp4 90.52MB
2. Digital Forensics.mp4 51.15MB
2. Digital Signatures & Digital Certificates.mp4 94.99MB
2. Identity Management Controls.mp4 90.22MB
2. Information gathering.mp4 88.13MB
2. Information Security programs.mp4 96.61MB
20 418.70KB
21 126.83KB
22 595.78KB
23 746.31KB
24 32.31KB
25 866.40KB
26 351.95KB
27 833.68KB
28 533.62KB
29 604.03KB
3 276.37KB
3.1 3. Digital certificate Authorities.pdf 953.66KB
3.1 3.Types of Threat Actors and Attack Vectors.pdf 5.30MB
3.1 Cloud, Virtualization, BYOD and Security Testing.pdf 8.16MB
3.1 Risk Management.pdf 5.52MB
3. Cloud, Virtualization, BYOD & Security Testing.mp4 125.73MB
3. Digital Certificate Authorities.mp4 43.19MB
3. Risk Management.mp4 54.88MB
3. Scanning.mp4 40.05MB
3. Types of Threat Actors and Attack Vectors.mp4 68.65MB
30 15.13KB
31 148.11KB
32 493.24KB
33 991.11KB
34 51.40KB
35 226.32KB
36 855.05KB
37 494.87KB
38 656.54KB
39 718.93KB
4 56.18KB
4.1 4. Public Key Infrastructure - PKI.pdf 3.48MB
4.1 4.Threat Intelligence & Threat research Sources.pdf 602.94KB
4.1 Implementing Personnel Policies.pdf 2.34MB
4. Exploitation.mp4 17.52MB
4. Implementing Personnel Policies.mp4 54.27MB
4. Public Key Infastructure.mp4 52.97MB
4. Threat Intelligence & Threat Research.mp4 95.88MB
40 821.02KB
41 124.64KB
42 200.59KB
43 214.42KB
44 497.39KB
45 203.05KB
46 476.54KB
47 528.75KB
48 802.79KB
49 223.32KB
5 287.93KB
5.1 12.Implementing Account Policies & Authorization Solutions.pdf 1.23MB
5.1 5. Commands used in Assessing Network layout & Security.pdf 793.42KB
5.1 5. PKI Management.pdf 3.53MB
5. Account Policies & Authorization.mp4 40.41MB
5. Commands used in Assessing Network layout & Security.mp4 105.95MB
5. PKI Management.mp4 102.56MB
5. Post Exploitation Maintaining access.mp4 41.48MB
50 256.48KB
51 395.54KB
52 447.75KB
53 612.77KB
54 679.99KB
55 323.33KB
6 52.13KB
6.1 6.Identification, Authentication & Access Control Systems.pdf 1.68MB
6.1 6. Security concerns regarding Vulnerabilities.pdf 2.56MB
6. Identification, Authentication & Access Control Systems.mp4 33.86MB
6. Reporting.mp4 12.95MB
6. Security concerns regarding Vulnerabilities.mp4 62.21MB
7 270.15KB
7.1 7.Vulnerability Scanning Techniques and Vulnerability scores & exposures.pdf 2.78MB
7. Knowledge based Authentication.mp4 113.72MB
7. Vulnerability Scanning Techniques and Vulnerability scores & exposures.mp4 58.59MB
8 448.66KB
8.1 8. Technology implementing Secure Authentication.pdf 4.88MB
8.1 9.Social Engineering Attacks & Principles.pdf 4.80MB
8. Social Engineering Attacks & Principles.mp4 123.17MB
8. Technology behind Secure Authentication.mp4 90.38MB
9 403.61KB
9.1 10.Malware and Types of malwares.pdf 4.51MB
9.1 9. Biometric Authentication Concepts.pdf 15.03MB
9. Biometric Authentication.mp4 175.85MB
9. Malware and Types of malwares.mp4 65.23MB
TutsNode.net.txt 63B
Distribution statistics by country
Bulgaria (BG) 1
Philippines (PH) 1
Total 2
IP List List of IP addresses which were distributed this torrent