Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
489.10KB |
001 - Introduction to CISSP.mp4 |
7.09MB |
002 - C-I-A.mp4 |
123.72MB |
003 - Security Governance Fundamentals.mp4 |
80.30MB |
005 - Regulatory Compliance.mp4 |
115.54MB |
006 - Protecting Privacy.mp4 |
116.62MB |
007 - Intellectual Property.mp4 |
71.69MB |
008 - Import-Export.mp4 |
39.39MB |
009 - Ethics.mp4 |
35.16MB |
011 - Risk Definitions.mp4 |
65.97MB |
012 - Risk Frameworks.mp4 |
51.63MB |
013 - Risk Assessment.mp4 |
144.08MB |
014 - Threats and Threat Agents.mp4 |
65.98MB |
015 - Risk Assignment.mp4 |
60.41MB |
016 - Threat Modeling.mp4 |
38.65MB |
017 - Security Awareness.mp4 |
64.51MB |
018 - Due Diligence and Due Care.mp4 |
52.88MB |
019 - Vendor Security.mp4 |
64.89MB |
021 - Policy.mp4 |
48.76MB |
022 - Personnel Security.mp4 |
82.05MB |
023 - Control Frameworks.mp4 |
77.60MB |
024 - SLAs.mp4 |
27.56MB |
025 - Security Documents.mp4 |
41.83MB |
027 - Managing Data.mp4 |
100.95MB |
028 - Data Ownership.mp4 |
26.41MB |
029 - Data Security Controls.mp4 |
70.13MB |
030 - Data Remanence.mp4 |
57.99MB |
031 - Data at Rest.mp4 |
89.29MB |
032 - Data in Transit.mp4 |
66.77MB |
033 - Classification.mp4 |
77.82MB |
035 - Cryptography Terminology.mp4 |
84.82MB |
036 - Hashing.mp4 |
74.11MB |
037 - Cryptographic Attacks.mp4 |
63.86MB |
038 - Symmetric Cryptography.mp4 |
67.95MB |
039 - Asymmetric Cryptography.mp4 |
74.74MB |
040 - Hybrid Cryptography.mp4 |
41.54MB |
042 - Ciphers.mp4 |
28.87MB |
043 - Digital Signatures.mp4 |
81.06MB |
045 - PKI Definition and Components.mp4 |
78.02MB |
046 - PKI Certificates.mp4 |
32.19MB |
047 - Key Management.mp4 |
82.78MB |
048 - Key Exchange.mp4 |
70.12MB |
050 - Secure Design Principles.mp4 |
66.65MB |
051 - Security Models Part 1.mp4 |
67.94MB |
052 - Security Models Part 2.mp4 |
84.49MB |
053 - Security Models Part 3.mp4 |
70.57MB |
054 - Security Modes.mp4 |
30.90MB |
055 - Evaluation Models.mp4 |
52.42MB |
056 - Rainbow Series.mp4 |
27.31MB |
057 - Common Criteria.mp4 |
54.94MB |
058 - Certification and Accreditation.mp4 |
29.89MB |
060 - TCB.mp4 |
17.68MB |
061 - Computer Components.mp4 |
62.16MB |
062 - Protection Mechanisms.mp4 |
67.60MB |
063 - Common Architecture Flaws.mp4 |
86.93MB |
064 - Web-Based Vulnerabilities.mp4 |
69.51MB |
065 - Covert Channels.mp4 |
48.60MB |
066 - Embedded Systems.mp4 |
47.89MB |
068 - Facility Design.mp4 |
63.75MB |
069 - Facility Construction.mp4 |
36.23MB |
070 - Physical Security.mp4 |
112.92MB |
071 - Perimeter Defenses.mp4 |
100.98MB |
072 - Doors and Locks.mp4 |
70.68MB |
073 - Internal Facilities Security.mp4 |
117.72MB |
074 - Physical Intrusion Detection.mp4 |
107.72MB |
075 - Personnel Safety.mp4 |
33.40MB |
077 - Data Center Security.mp4 |
50.26MB |
078 - Media Storage.mp4 |
33.24MB |
079 - Utilities and HVAC.mp4 |
95.57MB |
080 - Fire Safety.mp4 |
86.40MB |
082 - Database Architectures.mp4 |
38.18MB |
083 - Database Terminology.mp4 |
72.21MB |
084 - Data Mining.mp4 |
33.14MB |
085 - Transaction Management.mp4 |
45.60MB |
086 - Database Attacks.mp4 |
65.35MB |
088 - OSI Protocols.mp4 |
70.69MB |
090 - OSI Layers.mp4 |
88.81MB |
092 - TCPIP Model.mp4 |
45.84MB |
093 - Network Devices.mp4 |
96.51MB |
094 - Network Security.mp4 |
49.75MB |
095 - IP Networking.mp4 |
116.81MB |
097 - DNS and DHCP.mp4 |
79.52MB |
098 - ARP.mp4 |
32.60MB |
099 - Multi-layer Protocols.mp4 |
44.73MB |
1 |
603.95KB |
10 |
1.08MB |
100 |
1.72MB |
100 - Converged Protocols.mp4 |
91.03MB |
101 |
1.85MB |
101 - Network Cabling and Topology.mp4 |
120.43MB |
102 |
1.12MB |
102 - Signaling Types.mp4 |
40.90MB |
103 |
1.15MB |
103 - Network Attacks.mp4 |
100.89MB |
104 |
1.58MB |
104 - Switching.mp4 |
17.10MB |
105 |
1.93MB |
106 |
379.24KB |
106 - Wireless Networks.mp4 |
105.04MB |
107 |
877.03KB |
107 - Mobile Systems.mp4 |
92.38MB |
108 |
1.74MB |
108 - WAN Technologies.mp4 |
74.67MB |
109 |
258.33KB |
109 - Remote Access.mp4 |
61.03MB |
11 |
67.48KB |
110 |
489.83KB |
110 - Secure Communication Protocols.mp4 |
81.76MB |
111 |
599.74KB |
112 |
733.72KB |
112 - Firewalls.mp4 |
74.75MB |
113 |
1.01MB |
113 - DMZ.mp4 |
80.99MB |
114 |
1.24MB |
114 - Honeypots.mp4 |
42.44MB |
115 |
1.40MB |
115 - Endpoint Security.mp4 |
24.66MB |
116 |
1.76MB |
116 - IDS.mp4 |
67.72MB |
117 |
1.88MB |
117 - Authentication Protocols.mp4 |
29.86MB |
118 |
116.41KB |
119 |
144.15KB |
119 - VPN and VLAN.mp4 |
61.47MB |
12 |
284.47KB |
120 |
167.63KB |
121 |
407.44KB |
121 - Distributed and Cloud Computing.mp4 |
60.19MB |
122 |
433.90KB |
122 - Virtualization.mp4 |
76.57MB |
123 |
1.20MB |
123 - Virtualized Networks.mp4 |
52.07MB |
124 |
1.27MB |
125 |
1.42MB |
125 - Access Control Basics.mp4 |
59.03MB |
126 |
1.32MB |
126 - Access Control Categories.mp4 |
74.25MB |
127 |
1.56MB |
127 - Authentication.mp4 |
106.09MB |
128 |
39.79KB |
129 |
177.38KB |
129 - Account Management.mp4 |
52.85MB |
13 |
1.91MB |
130 |
475.80KB |
130 - Single Sign-On (SSO).mp4 |
49.41MB |
131 |
939.21KB |
132 |
1.10MB |
132 - Identification.mp4 |
23.95MB |
133 |
625.21KB |
133 - Something You Know.mp4 |
54.28MB |
134 |
1.35MB |
134 - Something You Have.mp4 |
76.64MB |
135 |
1.75MB |
135 - Something You Are (Biometrics).mp4 |
65.83MB |
136 |
1.82MB |
137 |
332.37KB |
137 - Authorization.mp4 |
35.04MB |
138 |
1.77MB |
138 - Session Management and Accountability.mp4 |
34.26MB |
139 |
863.90KB |
139 - WLAN Authentication.mp4 |
92.98MB |
14 |
985.31KB |
140 |
986.57KB |
140 - Remote Authentication Services.mp4 |
41.08MB |
141 |
1.74MB |
141 - Federated Identity.mp4 |
51.14MB |
142 |
1.76MB |
142 - Integrating Identity Services.mp4 |
37.68MB |
143 |
616.57KB |
143 - Access Control Models.mp4 |
71.03MB |
144 |
779.93KB |
144 - Access Control Techniques.mp4 |
48.12MB |
145 |
879.08KB |
145 - Access Control Administration.mp4 |
29.50MB |
146 |
1.40MB |
146 - Access Control Attacks.mp4 |
54.84MB |
147 |
1.81MB |
147 - Social Engineering.mp4 |
55.65MB |
148 |
1.10MB |
148 - Circumventing Access Controls.mp4 |
23.39MB |
149 |
114.98KB |
149 - Access Provisioning.mp4 |
66.36MB |
15 |
1.02MB |
150 |
146.21KB |
151 |
507.48KB |
151 - Security Assessment Goals.mp4 |
56.37MB |
152 |
1.13MB |
152 - Control Testing.mp4 |
69.54MB |
153 |
446.22KB |
153 - Penetration Testing.mp4 |
72.28MB |
154 |
711.54KB |
154 - Security Management Processes.mp4 |
49.28MB |
155 |
1.59MB |
156 |
1.34MB |
156 - Computer Crime.mp4 |
44.58MB |
157 |
50.58KB |
157 - Investigations.mp4 |
89.93MB |
158 |
627.45KB |
158 - Forensics.mp4 |
121.28MB |
159 |
323.60KB |
159 - Evidence.mp4 |
141.41MB |
16 |
1.05MB |
160 |
919.23KB |
161 |
929.70KB |
161 - Log Management.mp4 |
92.38MB |
162 - Egress Monitoring.mp4 |
71.73MB |
163 - Configuration Management.mp4 |
54.15MB |
164 - Operations Concepts.mp4 |
82.09MB |
165 - Preventive Measures.mp4 |
96.89MB |
166 - Trusted Recovery.mp4 |
41.96MB |
167 - Patch & Vulnerability Management.mp4 |
45.86MB |
169 - Business Continuity Planning.mp4 |
72.78MB |
17 |
1.11MB |
170 - Incident Response Plan.mp4 |
83.99MB |
171 - Business Impact Analysis (BIA).mp4 |
83.10MB |
173 - Recovery Strategy.mp4 |
100.81MB |
174 - Recovery Process.mp4 |
129.30MB |
175 - Disaster Recovery Plan (DRP) Testing.mp4 |
49.52MB |
176 - RAID.mp4 |
42.68MB |
177 - Backups.mp4 |
75.91MB |
178 - Network Redundancy.mp4 |
48.99MB |
18 |
1.19MB |
180 - Secure Software Design.mp4 |
83.81MB |
181 - Secure SDLC.mp4 |
66.50MB |
182 - Software Development Models.mp4 |
107.93MB |
183 - Maturity Models.mp4 |
56.79MB |
185 - Change Control.mp4 |
58.50MB |
186 - Software Testing.mp4 |
94.80MB |
187 - Software Environment.mp4 |
87.22MB |
188 - Object-Oriented Programming (OOP).mp4 |
45.58MB |
189 - Distributed Computing.mp4 |
38.25MB |
19 |
1.11MB |
190 - Mobile Code.mp4 |
48.24MB |
191 - Acquired Software.mp4 |
34.24MB |
192 - Application Attacks.mp4 |
80.68MB |
193 - Malware.mp4 |
44.80MB |
2 |
718.55KB |
20 |
1.49MB |
21 |
443.22KB |
22 |
1.20MB |
23 |
1.02MB |
24 |
1.62MB |
25 |
1.62MB |
26 |
990.14KB |
27 |
74.92KB |
28 |
723.13KB |
29 |
1.19MB |
3 |
290.67KB |
30 |
796.84KB |
31 |
1.07MB |
32 |
1.60MB |
33 |
1.18MB |
34 |
1.51MB |
35 |
11.72KB |
36 |
192.60KB |
37 |
917.25KB |
38 |
1.22MB |
39 |
1.91MB |
4 |
736.24KB |
40 |
1.95MB |
41 |
241.79KB |
42 |
961.00KB |
43 |
1.01MB |
44 |
1.32MB |
45 |
1.70MB |
46 |
493.56KB |
47 |
1.98MB |
48 |
188.35KB |
49 |
406.51KB |
5 |
1.57MB |
50 |
1.36MB |
51 |
1.43MB |
52 |
95.46KB |
53 |
1.25MB |
54 |
1.26MB |
55 |
1.33MB |
56 |
1.75MB |
57 |
1.89MB |
58 |
1.22MB |
59 |
1.72MB |
6 |
290.27KB |
60 |
1.79MB |
61 |
271.77KB |
62 |
319.25KB |
63 |
994.65KB |
64 |
1.31MB |
65 |
1.32MB |
66 |
1.43MB |
67 |
1.87MB |
68 |
1.88MB |
69 |
471.18KB |
7 |
1.19MB |
70 |
499.52KB |
71 |
51.25KB |
72 |
65.78KB |
73 |
283.00KB |
74 |
410.17KB |
75 |
1.23MB |
76 |
1.35MB |
77 |
1.50MB |
78 |
1.64MB |
79 |
24.42KB |
8 |
1.38MB |
80 |
32.73KB |
81 |
179.09KB |
82 |
662.66KB |
83 |
1.11MB |
84 |
1.49MB |
85 |
146.31KB |
86 |
260.42KB |
87 |
1.84MB |
88 |
537.69KB |
89 |
989.14KB |
9 |
471.60KB |
90 |
1.59MB |
91 |
1.81MB |
92 |
990.48KB |
93 |
1.50MB |
94 |
13.67KB |
95 |
1.21MB |
96 |
1.63MB |
97 |
359.86KB |
98 |
1.06MB |
99 |
1.16MB |
Common Ports.pdf |
94.00KB |
Encryption.pdf |
223.96KB |
IPSec VPN.pdf |
78.69KB |
Notes on Access Control.pdf |
173.12KB |
Notes on Biometrics.pdf |
204.37KB |
Notes on IPv4-IPv6.pdf |
3.13MB |
Notes on Kerberos.pdf |
603.08KB |
OSI Model.pdf |
100.17KB |
TutsNode.com.txt |
63B |