Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
46б |
1 |
57б |
1. Analyzing Vulnerabilities.mp4 |
29.40Мб |
1. Analyzing Vulnerabilities.srt |
3.08Кб |
1. Asymmetric Algorithms.mp4 |
47.89Мб |
1. Asymmetric Algorithms.srt |
4.49Кб |
1. Attacking Vulnerabilities.mp4 |
26.96Мб |
1. Attacking Vulnerabilities.srt |
2.85Кб |
1. Authentication and Authorization (OBJ 1.5).mp4 |
37.22Мб |
1. Authentication and Authorization (OBJ 1.5).srt |
3.71Кб |
1. Business Continuity (OBJ 4.4).mp4 |
25.23Мб |
1. Business Continuity (OBJ 4.4).srt |
2.81Кб |
1. Cloud and Virtualization (OBJ 1.6).mp4 |
23.57Мб |
1. Cloud and Virtualization (OBJ 1.6).srt |
2.39Кб |
1. Cloud Technologies.mp4 |
57.88Мб |
1. Cloud Technologies.srt |
5.84Кб |
1. Conclusion.mp4 |
225.79Мб |
1. Conclusion.srt |
26.14Кб |
1. Cryptography (OBJ 1.7).mp4 |
38.69Мб |
1. Cryptography (OBJ 1.7).srt |
3.89Кб |
1. Data Considerations (OBJ 4.3).mp4 |
20.27Мб |
1. Data Considerations (OBJ 4.3).srt |
2.26Кб |
1. Data Security (OBJ 1.4).mp4 |
78.28Мб |
1. Data Security (OBJ 1.4).srt |
8.34Кб |
1. Digital Forensics.mp4 |
22.52Мб |
1. Digital Forensics.srt |
2.30Кб |
1. Digital Forensic Tools.mp4 |
51.83Мб |
1. Digital Forensic Tools.srt |
4.98Кб |
1. Emerging Technology (OBJ 1.8).mp4 |
93.13Мб |
1. Emerging Technology (OBJ 1.8).srt |
10.98Кб |
1. Endpoint Security Controls.mp4 |
52.75Мб |
1. Endpoint Security Controls.srt |
5.28Кб |
1. Enterprise Mobility.mp4 |
57.24Мб |
1. Enterprise Mobility.srt |
5.78Кб |
1. Hashing and Symmetric Algorithms.mp4 |
25.91Мб |
1. Hashing and Symmetric Algorithms.srt |
2.77Кб |
1. Incident Response.mp4 |
31.23Мб |
1. Incident Response.srt |
3.14Кб |
1. Indicators of Compromise.mp4 |
39.36Мб |
1. Indicators of Compromise.srt |
3.76Кб |
1. Infrastructure Design (OBJ 1.2).mp4 |
24.79Мб |
1. Infrastructure Design (OBJ 1.2).srt |
2.49Кб |
1. Operational Technologies.mp4 |
45.13Мб |
1. Operational Technologies.srt |
4.32Кб |
1. Policies and Frameworks (OBJ. 4.1 & 4.3).mp4 |
30.24Мб |
1. Policies and Frameworks (OBJ. 4.1 & 4.3).srt |
3.09Кб |
1. Public Key Infrastructure.mp4 |
61.75Мб |
1. Public Key Infrastructure.srt |
6.25Кб |
1. Risk Management (OBJ 4.1).mp4 |
32.45Мб |
1. Risk Management (OBJ 4.1).srt |
3.58Кб |
1. Risk Reduction.mp4 |
33.41Мб |
1. Risk Reduction.srt |
3.22Кб |
1. Risk Strategies (OBJ 4.1).mp4 |
33.25Мб |
1. Risk Strategies (OBJ 4.1).srt |
3.48Кб |
1. Securing Architectures (OBJ 1.1).mp4 |
26.71Мб |
1. Securing Architectures (OBJ 1.1).srt |
2.80Кб |
1. Securing Networks (OBJ 1.1).mp4 |
149.57Мб |
1. Securing Networks (OBJ 1.1).srt |
16.43Кб |
1. Software Applications (OBJ 1.3).mp4 |
58.29Мб |
1. Software Applications (OBJ 1.3).srt |
6.50Кб |
1. Threat and Vulnerability Management.mp4 |
41.91Мб |
1. Threat and Vulnerability Management.srt |
4.38Кб |
1. Vendor Risk (OBJ 4.2).mp4 |
88.25Мб |
1. Vendor Risk (OBJ 4.2).srt |
9.81Кб |
1. Vulnerability Assessments.mp4 |
33.78Мб |
1. Vulnerability Assessments.srt |
3.51Кб |
1. Welcome.mp4 |
184.93Мб |
1. Welcome.srt |
21.29Кб |
10 |
449.09Кб |
10. Analysis Utilities (OBJ. 2.4).mp4 |
110.13Мб |
10. Analysis Utilities (OBJ. 2.4).srt |
12.73Кб |
10. Auditing Files (OBJ 1.4).mp4 |
46.96Мб |
10. Auditing Files (OBJ 1.4).srt |
8.39Кб |
10. Checkpoint Analyzing Vulnerabilities.html |
160б |
10. Checkpoint Cloud and Virtualization.html |
160б |
10. Checkpoint Enterprise Mobility.html |
160б |
10. Checkpoint Indicators of Compromise.html |
160б |
10. Checkpoint Vendor Risk.html |
160б |
10. Collection Tools (OBJ. 2.9).mp4 |
133.14Мб |
10. Collection Tools (OBJ. 2.9).srt |
13.45Кб |
10. Key Stretching (OBJ. 3.6).mp4 |
94.89Мб |
10. Key Stretching (OBJ. 3.6).srt |
10.76Кб |
10. Logging and Monitoring (OBJ. 3.2).mp4 |
133.20Мб |
10. Logging and Monitoring (OBJ. 3.2).srt |
14.98Кб |
10. Merging Networks (OBJ 1.1).mp4 |
118.16Мб |
10. Merging Networks (OBJ 1.1).srt |
13.69Кб |
10. Network Access Control (NAC) (OBJ 1.1).mp4 |
61.91Мб |
10. Network Access Control (NAC) (OBJ 1.1).srt |
6.72Кб |
10. Quantum Computing (OBJ 1.8).mp4 |
121.07Мб |
10. Quantum Computing (OBJ 1.8).srt |
12.89Кб |
10. Root of Trust (OBJ 1.5).mp4 |
93.57Мб |
10. Root of Trust (OBJ 1.5).srt |
9.94Кб |
10. Troubleshooting Certificates (OBJ. 3.7).mp4 |
115.07Мб |
10. Troubleshooting Certificates (OBJ. 3.7).srt |
13.32Кб |
10. VM Attacks (OBJ. 2.5).mp4 |
100.86Мб |
10. VM Attacks (OBJ. 2.5).srt |
11.82Кб |
100 |
714.24Кб |
101 |
721.70Кб |
102 |
848.46Кб |
103 |
1.21Мб |
104 |
438.66Кб |
105 |
1.20Мб |
106 |
86.83Кб |
107 |
95.75Кб |
108 |
174.20Кб |
109 |
364.59Кб |
11 |
96.76Кб |
11. Attestation (OBJ 1.5).mp4 |
48.93Мб |
11. Attestation (OBJ 1.5).srt |
5.38Кб |
11. Checkpoint Asymmetric Algorithms.html |
160б |
11. Checkpoint Data Security.html |
160б |
11. Checkpoint Emerging Technology.html |
160б |
11. Configuring SIEM Agents (OBJ. 3.2).mp4 |
141.36Мб |
11. Configuring SIEM Agents (OBJ. 3.2).srt |
41.05Кб |
11. Network Attacks (OBJ. 2.5).mp4 |
239.52Мб |
11. Network Attacks (OBJ. 2.5).srt |
26.60Кб |
11. Remote Access (OBJ 1.1).mp4 |
195.45Мб |
11. Remote Access (OBJ 1.1).srt |
20.51Кб |
11. Software-Defined Networking (SDN) (OBJ 1.1).mp4 |
117.52Мб |
11. Software-Defined Networking (SDN) (OBJ 1.1).srt |
13.16Кб |
11. Troubleshooting Keys (OBJ. 3.7).mp4 |
75.27Мб |
11. Troubleshooting Keys (OBJ. 3.7).srt |
8.76Кб |
11. Using Collection Tools (OBJ. 2.10).mp4 |
45.35Мб |
11. Using Collection Tools (OBJ. 2.10).srt |
10.27Кб |
11. Vulnerability Scanning (OBJ. 2.4).mp4 |
81.97Мб |
11. Vulnerability Scanning (OBJ. 2.4).srt |
20.84Кб |
110 |
806.29Кб |
111 |
1.20Мб |
112 |
33.82Кб |
113 |
521.96Кб |
114 |
581.33Кб |
115 |
708.60Кб |
116 |
1.38Мб |
117 |
1.45Мб |
118 |
1.95Мб |
119 |
4.80Кб |
12 |
105.46Кб |
12. Analyzing Scan Outputs (OBJ. 2.4).mp4 |
80.55Мб |
12. Analyzing Scan Outputs (OBJ. 2.4).srt |
31.19Кб |
12. Analyzing Web Applications (OBJ. 2.5).mp4 |
136.72Мб |
12. Analyzing Web Applications (OBJ. 2.5).srt |
34.38Кб |
12. Checkpoint Digital Forensic Tools.html |
160б |
12. Checkpoint Public Key Infrastructure.html |
160б |
12. Checkpoint Securing Architectures.html |
160б |
12. Identity Proofing (OBJ 1.5).mp4 |
77.97Мб |
12. Identity Proofing (OBJ 1.5).srt |
8.71Кб |
12. Resiliency (OBJ. 3.2).mp4 |
132.80Мб |
12. Resiliency (OBJ. 3.2).srt |
15.02Кб |
12. Unified Communications (OBJ 1.1).mp4 |
417.06Мб |
12. Unified Communications (OBJ 1.1).srt |
45.35Кб |
120 |
656.52Кб |
121 |
292.22Кб |
122 |
729.47Кб |
123 |
1.32Мб |
124 |
1.61Мб |
125 |
1.67Мб |
126 |
1.28Мб |
127 |
1.30Мб |
128 |
410.43Кб |
129 |
514.33Кб |
13 |
520.65Кб |
13. Checkpoint Authentication and Authorization.html |
160б |
13. Checkpoint Endpoint Security Controls.html |
160б |
13. Checkpoint Vulnerability Assessments.html |
160б |
13. Cloud vs On-premise (OBJ 1.1).mp4 |
105.64Мб |
13. Cloud vs On-premise (OBJ 1.1).srt |
11.95Кб |
13. Social Engineering (OBJ. 2.5).mp4 |
157.40Мб |
13. Social Engineering (OBJ. 2.5).srt |
17.48Кб |
130 |
1.39Мб |
131 |
1.98Мб |
132 |
820.99Кб |
133 |
876.33Кб |
134 |
1.20Мб |
135 |
1.49Мб |
136 |
1.61Мб |
137 |
309.62Кб |
138 |
424.60Кб |
139 |
1.11Мб |
14 |
1.22Мб |
14. DNSSEC (OBJ 1.1).mp4 |
92.83Мб |
14. DNSSEC (OBJ 1.1).srt |
8.79Кб |
14. Phishing Campaigns (OBJ. 2.5).mp4 |
46.06Мб |
14. Phishing Campaigns (OBJ. 2.5).srt |
12.26Кб |
140 |
1.27Мб |
141 |
1.28Мб |
142 |
746.90Кб |
143 |
998.03Кб |
144 |
480.65Кб |
145 |
1.12Мб |
146 |
1.16Мб |
147 |
416.23Кб |
148 |
744.45Кб |
149 |
951.67Кб |
15 |
514.08Кб |
15. Checkpoint Attacking Vulnerabilities.html |
160б |
15. Load Balancer (OBJ 1.1).mp4 |
147.21Мб |
15. Load Balancer (OBJ 1.1).srt |
15.84Кб |
150 |
1.07Мб |
151 |
1.52Мб |
152 |
1.93Мб |
153 |
1.84Мб |
154 |
209.18Кб |
155 |
470.52Кб |
156 |
490.33Кб |
157 |
950.73Кб |
158 |
1.38Мб |
159 |
1.81Мб |
16 |
126.23Кб |
16. Checkpoint Securing Networks.html |
160б |
160 |
1.09Мб |
161 |
1.72Мб |
162 |
494.47Кб |
163 |
1.57Мб |
164 |
1.87Мб |
165 |
71.12Кб |
166 |
85.60Кб |
167 |
571.78Кб |
168 |
1.84Мб |
169 |
1.91Мб |
17 |
652.71Кб |
170 |
333.30Кб |
171 |
232.51Кб |
172 |
372.05Кб |
173 |
908.65Кб |
174 |
1.62Мб |
175 |
621.89Кб |
176 |
777.57Кб |
177 |
785.54Кб |
178 |
1.54Мб |
179 |
1.69Мб |
18 |
287.28Кб |
180 |
194.97Кб |
181 |
1.14Мб |
182 |
1.62Мб |
183 |
1.78Мб |
184 |
86.27Кб |
185 |
157.30Кб |
186 |
211.61Кб |
187 |
966.83Кб |
188 |
1.45Мб |
189 |
1.33Мб |
19 |
488.13Кб |
190 |
1.54Мб |
191 |
1.75Мб |
192 |
1.78Мб |
193 |
1.98Мб |
194 |
788.88Кб |
195 |
1.11Мб |
196 |
1.93Мб |
197 |
442.99Кб |
198 |
893.26Кб |
199 |
1.17Мб |
2 |
111б |
2.1 CASP (CAS-004) Objectives.pdf |
1.50Мб |
2.2 CompTIA CASP+ (CAS-004) Study Notes.pdf |
4.09Мб |
2. Access Control (OBJ 1.5).mp4 |
101.81Мб |
2. Access Control (OBJ 1.5).srt |
11.66Кб |
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).mp4 |
192.36Мб |
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).srt |
22.53Кб |
2. Asset Value (OBJ 4.1).mp4 |
88.19Мб |
2. Asset Value (OBJ 4.1).srt |
9.44Кб |
2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).mp4 |
171.08Мб |
2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).srt |
19.23Кб |
2. Business Continuity Plan (OBJ 4.4).mp4 |
299.78Мб |
2. Business Continuity Plan (OBJ 4.4).srt |
35.58Кб |
2. Business Models (OBJ 4.2).mp4 |
239.34Мб |
2. Business Models (OBJ 4.2).srt |
28.45Кб |
2. CASP+ (CAS-004) Practice Exam.html |
160б |
2. Cloud Deployment Models (OBJ 1.6).mp4 |
96.25Мб |
2. Cloud Deployment Models (OBJ 1.6).srt |
11.04Кб |
2. Data Life Cycle (OBJ 1.4).mp4 |
229.21Мб |
2. Data Life Cycle (OBJ 1.4).srt |
24.98Кб |
2. Data Security (OBJ. 4.3).mp4 |
79.97Мб |
2. Data Security (OBJ. 4.3).srt |
8.78Кб |
2. Deceptive Technologies (OBJ. 2.6).mp4 |
105.11Мб |
2. Deceptive Technologies (OBJ. 2.6).srt |
11.87Кб |
2. Device Hardening (OBJ. 3.2).mp4 |
182.84Мб |
2. Device Hardening (OBJ. 3.2).srt |
19.89Кб |
2. Directory Traversals (OBJ. 2.5).mp4 |
211.66Мб |
2. Directory Traversals (OBJ. 2.5).srt |
20.90Кб |
2. Download Your Free Study Guide.html |
76б |
2. Embedded Systems (OBJ. 3.3).mp4 |
226.52Мб |
2. Embedded Systems (OBJ. 3.3).srt |
24.87Кб |
2. Enterprise Mobility Management (EMM) (OBJ. 3.1).mp4 |
211.05Мб |
2. Enterprise Mobility Management (EMM) (OBJ. 3.1).srt |
23.03Кб |
2. Forensic Process (OBJ. 2.8).mp4 |
100.38Мб |
2. Forensic Process (OBJ. 2.8).srt |
11.86Кб |
2. Forensic Workstations (OBJ. 2.9).mp4 |
107.67Мб |
2. Forensic Workstations (OBJ. 2.9).srt |
12.50Кб |
2. Hashing (OBJ. 3.6).mp4 |
147.64Мб |
2. Hashing (OBJ. 3.6).srt |
16.17Кб |
2. Penetration Test (OBJ. 2.4).mp4 |
103.39Мб |
2. Penetration Test (OBJ. 2.4).srt |
11.66Кб |
2. PKI Components (OBJ. 3.5).mp4 |
223.24Мб |
2. PKI Components (OBJ. 3.5).srt |
24.53Кб |
2. Policies (OBJ. 4.1).mp4 |
261.96Мб |
2. Policies (OBJ. 4.1).srt |
32.80Кб |
2. Privacy and Confidentiality (OBJ 1.7).mp4 |
143.97Мб |
2. Privacy and Confidentiality (OBJ 1.7).srt |
14.67Кб |
2. Race Conditions (OBJ. 2.5).mp4 |
104.38Мб |
2. Race Conditions (OBJ. 2.5).srt |
11.54Кб |
2. Risk Strategies (OBJ. 4.1).mp4 |
96.67Мб |
2. Risk Strategies (OBJ. 4.1).srt |
11.76Кб |
2. Scalability (OBJ 1.2).mp4 |
121.27Мб |
2. Scalability (OBJ 1.2).srt |
12.67Кб |
2. Switches (OBJ 1.1).mp4 |
153.59Мб |
2. Switches (OBJ 1.1).srt |
17.36Кб |
2. Systems Development Life Cycle (OBJ 1.3).mp4 |
143.31Мб |
2. Systems Development Life Cycle (OBJ 1.3).srt |
16.63Кб |
2. Threat Intelligence (OBJ. 2.1).mp4 |
135.60Мб |
2. Threat Intelligence (OBJ. 2.1).srt |
15.86Кб |
2. Traffic Mirroring (OBJ 1.1).mp4 |
94.07Мб |
2. Traffic Mirroring (OBJ 1.1).srt |
10.28Кб |
2. Triage (OBJ. 2.7).mp4 |
174.75Мб |
2. Triage (OBJ. 2.7).srt |
19.19Кб |
2. Types of IoCs (OBJ. 2.2).mp4 |
61.96Мб |
2. Types of IoCs (OBJ. 2.2).srt |
9.15Кб |
2. Using Asymmetric Algortihms.mp4 |
200.81Мб |
2. Using Asymmetric Algortihms.srt |
22.14Кб |
20 |
671.26Кб |
200 |
322.42Кб |
201 |
389.94Кб |
202 |
1.97Мб |
203 |
1.59Мб |
204 |
1.75Мб |
205 |
1.81Мб |
206 |
1.44Мб |
207 |
1.55Мб |
208 |
26.58Кб |
209 |
1.47Мб |
21 |
1.87Мб |
210 |
34.73Кб |
211 |
134.37Кб |
212 |
1.43Мб |
213 |
1.45Мб |
214 |
31.64Кб |
215 |
1.72Мб |
216 |
33.90Кб |
217 |
1.37Мб |
218 |
1.69Мб |
219 |
263.59Кб |
22 |
1.99Мб |
220 |
272.83Кб |
221 |
747.88Кб |
222 |
1.26Мб |
223 |
1.45Мб |
224 |
1.67Мб |
225 |
1.67Мб |
226 |
51.30Кб |
227 |
1.00Мб |
228 |
897.18Кб |
229 |
1.03Мб |
23 |
1.44Мб |
230 |
1.24Мб |
231 |
1.47Мб |
232 |
1.07Мб |
233 |
1.27Мб |
234 |
1.45Мб |
235 |
1.50Мб |
236 |
43.04Кб |
237 |
97.23Кб |
238 |
256.92Кб |
239 |
590.63Кб |
24 |
33.58Кб |
240 |
1.58Мб |
241 |
1.71Мб |
242 |
1.77Мб |
243 |
120.17Кб |
244 |
777.54Кб |
245 |
1.54Мб |
246 |
1.91Мб |
247 |
415.97Кб |
248 |
576.50Кб |
249 |
1.25Мб |
25 |
358.61Кб |
250 |
178.90Кб |
251 |
1.07Мб |
252 |
112.59Кб |
253 |
1.04Мб |
254 |
1.94Мб |
255 |
664.35Кб |
256 |
888.45Кб |
257 |
90.50Кб |
258 |
1.80Мб |
259 |
658.88Кб |
26 |
1.37Мб |
260 |
1.31Мб |
261 |
1.61Мб |
262 |
794.18Кб |
263 |
1.33Мб |
264 |
1.34Мб |
265 |
1.72Мб |
266 |
224.52Кб |
267 |
602.22Кб |
268 |
765.58Кб |
269 |
1.55Мб |
27 |
645.38Кб |
270 |
785.65Кб |
271 |
1.76Мб |
272 |
612.92Кб |
273 |
1.28Мб |
274 |
1.04Мб |
275 |
1.29Мб |
276 |
92.68Кб |
277 |
785.93Кб |
278 |
1.21Мб |
279 |
1.28Мб |
28 |
1.49Мб |
280 |
1.87Мб |
281 |
437.05Кб |
282 |
1.48Мб |
283 |
1.73Мб |
29 |
1.95Мб |
3 |
78б |
3. Access Control (OBJ 4.1).mp4 |
136.70Мб |
3. Access Control (OBJ 4.1).srt |
14.94Кб |
3. Buffer Overflows (OBJ. 2.5).mp4 |
271.11Мб |
3. Buffer Overflows (OBJ. 2.5).srt |
29.78Кб |
3. Business Impact Analysis (OBJ 4.4).mp4 |
299.72Мб |
3. Business Impact Analysis (OBJ 4.4).srt |
33.08Кб |
3. Calculating Hash Digests (OBJ. 3.6).mp4 |
34.28Мб |
3. Calculating Hash Digests (OBJ. 3.6).srt |
6.16Кб |
3. Chain of Custody (OBJ. 2.8).mp4 |
154.37Мб |
3. Chain of Custody (OBJ. 2.8).srt |
17.48Кб |
3. Checkpoint Introduction.html |
160б |
3. Cloud Encryption (OBJ. 3.4).mp4 |
114.19Мб |
3. Cloud Encryption (OBJ. 3.4).srt |
12.83Кб |
3. Cloud Service Models (OBJ 1.6).mp4 |
109.93Мб |
3. Cloud Service Models (OBJ 1.6).srt |
12.50Кб |
3. Communication Plan (OBJ. 2.7).mp4 |
219.69Мб |
3. Communication Plan (OBJ. 2.7).srt |
25.04Кб |
3. Credential Management (OBJ 1.5).mp4 |
95.23Мб |
3. Credential Management (OBJ 1.5).srt |
10.52Кб |
3. Cross-Site Scripting (XSS) (OBJ. 2.5).mp4 |
194.46Мб |
3. Cross-Site Scripting (XSS) (OBJ. 2.5).srt |
21.18Кб |
3. Data Classification (OBJ. 4.3).mp4 |
58.42Мб |
3. Data Classification (OBJ. 4.3).srt |
6.49Кб |
3. Data Classification (OBJ 1.4).mp4 |
151.30Мб |
3. Data Classification (OBJ 1.4).srt |
17.11Кб |
3. Deep Learning (OBJ 1.8).mp4 |
194.60Мб |
3. Deep Learning (OBJ 1.8).srt |
21.99Кб |
3. Digital Certificates (OBJ. 3.5).mp4 |
163.00Мб |
3. Digital Certificates (OBJ. 3.5).srt |
18.85Кб |
3. File Carving Tools (OBJ. 2.9).mp4 |
76.31Мб |
3. File Carving Tools (OBJ. 2.9).srt |
7.80Кб |
3. Frameworks (OBJ. 4.1).mp4 |
109.92Мб |
3. Frameworks (OBJ. 4.1).srt |
12.63Кб |
3. ICS and SCADA (OBJ. 3.3).mp4 |
198.18Мб |
3. ICS and SCADA (OBJ. 3.3).srt |
23.53Кб |
3. Influences (OBJ 4.2).mp4 |
162.91Мб |
3. Influences (OBJ 4.2).srt |
18.54Кб |
3. Integrity and Non-repudiation (OBJ 1.7).mp4 |
142.00Мб |
3. Integrity and Non-repudiation (OBJ 1.7).srt |
14.72Кб |
3. Network Sensors (OBJ 1.1).mp4 |
253.49Мб |
3. Network Sensors (OBJ 1.1).srt |
28.35Кб |
3. PCAP Files (OBJ. 2.2).mp4 |
90.03Мб |
3. PCAP Files (OBJ. 2.2).srt |
9.66Кб |
3. PenTest Steps (OBJ. 2.4).mp4 |
152.69Мб |
3. PenTest Steps (OBJ. 2.4).srt |
18.07Кб |
3. Resiliency Issues (OBJ 1.2).mp4 |
279.45Мб |
3. Resiliency Issues (OBJ 1.2).srt |
30.16Кб |
3. Risk Management Lifecycle (OBJ. 4.1).mp4 |
256.65Мб |
3. Risk Management Lifecycle (OBJ. 4.1).srt |
30.99Кб |
3. Routers (OBJ 1.1).mp4 |
179.48Мб |
3. Routers (OBJ 1.1).srt |
18.76Кб |
3. Security Data Analytics (OBJ. 2.6).mp4 |
172.34Мб |
3. Security Data Analytics (OBJ. 2.6).srt |
26.60Кб |
3. Software Development Life Cycle (OBJ 1.3).mp4 |
127.03Мб |
3. Software Development Life Cycle (OBJ 1.3).srt |
14.29Кб |
3. SSLTLS and Cipher Suites (OBJ. 3.6).mp4 |
183.22Мб |
3. SSLTLS and Cipher Suites (OBJ. 3.6).srt |
18.93Кб |
3. Threat Hunting (OBJ. 2.1).mp4 |
143.43Мб |
3. Threat Hunting (OBJ. 2.1).srt |
17.57Кб |
3. Unnecessary Services (OBJ. 3.2).mp4 |
58.23Мб |
3. Unnecessary Services (OBJ. 3.2).srt |
11.84Кб |
3. WPA3 (OBJ. 3.1).mp4 |
156.70Мб |
3. WPA3 (OBJ. 3.1).srt |
15.37Кб |
30 |
185.39Кб |
31 |
809.19Кб |
32 |
1.48Мб |
33 |
218.70Кб |
34 |
397.13Кб |
35 |
780.73Кб |
36 |
315.33Кб |
37 |
1.79Мб |
38 |
639.23Кб |
39 |
346.99Кб |
4 |
3б |
4. Aggregating Risk (OBJ 4.1).mp4 |
66.53Мб |
4. Aggregating Risk (OBJ 4.1).srt |
7.92Кб |
4. Automation (OBJ 1.2).mp4 |
138.39Мб |
4. Automation (OBJ 1.2).srt |
15.40Кб |
4. Big Data (OBJ 1.8).mp4 |
99.92Мб |
4. Big Data (OBJ 1.8).srt |
10.37Кб |
4. Binary Analysis Tools (OBJ. 2.9).mp4 |
151.17Мб |
4. Binary Analysis Tools (OBJ. 2.9).srt |
16.56Кб |
4. Buffer Overflow Attack (OBJ. 2.6).mp4 |
91.62Мб |
4. Buffer Overflow Attack (OBJ. 2.6).srt |
13.16Кб |
4. Compliance and Policy (OBJ 1.7).mp4 |
74.74Мб |
4. Compliance and Policy (OBJ 1.7).srt |
7.98Кб |
4. Conduct Packet Analysis (OBJ. 2.2).mp4 |
80.57Мб |
4. Conduct Packet Analysis (OBJ. 2.2).srt |
13.34Кб |
4. Connectivity Options (OBJ. 3.1).mp4 |
189.66Мб |
4. Connectivity Options (OBJ. 3.1).srt |
19.81Кб |
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).mp4 |
157.65Мб |
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).srt |
18.53Кб |
4. Data Types (OBJ. 4.3).mp4 |
117.54Мб |
4. Data Types (OBJ. 4.3).srt |
12.93Кб |
4. Deployment Considerations (OBJ 1.6).mp4 |
108.09Мб |
4. Deployment Considerations (OBJ 1.6).srt |
11.90Кб |
4. Development Approaches (OBJ 1.3).mp4 |
236.56Мб |
4. Development Approaches (OBJ 1.3).srt |
28.01Кб |
4. Host Sensors (OBJ 1.1).mp4 |
130.73Мб |
4. Host Sensors (OBJ 1.1).srt |
14.14Кб |
4. ICS Protocols (OBJ. 3.3).mp4 |
233.37Мб |
4. ICS Protocols (OBJ. 3.3).srt |
26.42Кб |
4. Intelligence Collection (OBJ. 2.1).mp4 |
241.72Мб |
4. Intelligence Collection (OBJ. 2.1).srt |
28.61Кб |
4. Labeling and Tagging (OBJ 1.4).mp4 |
178.15Мб |
4. Labeling and Tagging (OBJ 1.4).srt |
19.80Кб |
4. Message Authentication (OBJ. 3.6).mp4 |
74.55Мб |
4. Message Authentication (OBJ. 3.6).srt |
7.74Кб |
4. Order of Volatility (OBJ. 2.8).mp4 |
138.68Мб |
4. Order of Volatility (OBJ. 2.8).srt |
16.18Кб |
4. Organizational Changes (OBJ 4.2).mp4 |
131.59Мб |
4. Organizational Changes (OBJ 4.2).srt |
14.88Кб |
4. Password Policies (OBJ 1.5).mp4 |
171.66Мб |
4. Password Policies (OBJ 1.5).srt |
18.28Кб |
4. Patching (OBJ. 3.2).mp4 |
99.79Мб |
4. Patching (OBJ. 3.2).srt |
10.86Кб |
4. PenTest Requirements (OBJ. 2.4).mp4 |
252.78Мб |
4. PenTest Requirements (OBJ. 2.4).srt |
29.62Кб |
4. Preventative Controls (OBJ. 2.6).mp4 |
110.43Мб |
4. Preventative Controls (OBJ. 2.6).srt |
12.81Кб |
4. Privacy Impact Assessment (OBJ 4.4).mp4 |
84.45Мб |
4. Privacy Impact Assessment (OBJ 4.4).srt |
9.83Кб |
4. Regulations (OBJ. 4.3).mp4 |
170.19Мб |
4. Regulations (OBJ. 4.3).srt |
20.21Кб |
4. Risk Types (OBJ. 4.1).mp4 |
64.93Мб |
4. Risk Types (OBJ. 4.1).srt |
7.61Кб |
4. Serverless Computing (OBJ. 3.4).mp4 |
195.59Мб |
4. Serverless Computing (OBJ. 3.4).srt |
21.67Кб |
4. SMIME and SSH (OBJ. 3.6).mp4 |
162.78Мб |
4. SMIME and SSH (OBJ. 3.6).srt |
18.14Кб |
4. Stakeholder Management (OBJ. 2.7).mp4 |
154.61Мб |
4. Stakeholder Management (OBJ. 2.7).srt |
17.62Кб |
4. Using Digital Certificates (OBJ. 3.5).mp4 |
120.93Мб |
4. Using Digital Certificates (OBJ. 3.5).srt |
13.67Кб |
4. Wireless and Mesh (OBJ 1.1).mp4 |
73.00Мб |
4. Wireless and Mesh (OBJ 1.1).srt |
7.45Кб |
40 |
681.12Кб |
41 |
977.80Кб |
42 |
1.19Мб |
43 |
1.24Мб |
44 |
38.67Кб |
45 |
184.69Кб |
46 |
1.00Мб |
47 |
1.19Мб |
48 |
1.93Мб |
49 |
1.82Мб |
5 |
618.84Кб |
5. Application Controls (OBJ. 2.6).mp4 |
210.81Мб |
5. Application Controls (OBJ. 2.6).srt |
24.22Кб |
5. Authentication and References (OBJ. 2.5).mp4 |
54.09Мб |
5. Authentication and References (OBJ. 2.5).srt |
14.06Кб |
5. Blockchain & Distributed Consensus (OBJ 1.8).mp4 |
120.07Мб |
5. Blockchain & Distributed Consensus (OBJ 1.8).srt |
13.28Кб |
5. Code Analysis (OBJ. 2.4).mp4 |
182.06Мб |
5. Code Analysis (OBJ. 2.4).srt |
21.09Кб |
5. Data Retention (OBJ. 4.3).mp4 |
150.79Мб |
5. Data Retention (OBJ. 4.3).srt |
17.75Кб |
5. Data States (OBJ 1.7).mp4 |
151.30Мб |
5. Data States (OBJ 1.7).srt |
15.75Кб |
5. Deidentification (OBJ 1.4).mp4 |
243.36Мб |
5. Deidentification (OBJ 1.4).srt |
26.28Кб |
5. EAP (OBJ. 3.6).mp4 |
117.80Мб |
5. EAP (OBJ. 3.6).srt |
12.60Кб |
5. Exploring Server Certificates (OBJ. 3.5).mp4 |
24.72Мб |
5. Exploring Server Certificates (OBJ. 3.5).srt |
7.37Кб |
5. Firewalls (OBJ 1.1).mp4 |
245.88Мб |
5. Firewalls (OBJ 1.1).srt |
26.29Кб |
5. Forensic Analysis (OBJ. 2.8).mp4 |
143.49Мб |
5. Forensic Analysis (OBJ. 2.8).srt |
15.15Кб |
5. Implementing Password Policies (OBJ 1.5).mp4 |
28.72Мб |
5. Implementing Password Policies (OBJ 1.5).srt |
10.96Кб |
5. Incident Response Plan (OBJ 4.4).mp4 |
238.13Мб |
5. Incident Response Plan (OBJ 4.4).srt |
28.15Кб |
5. Incident Response Process (OBJ. 2.7).mp4 |
223.61Мб |
5. Incident Response Process (OBJ. 2.7).srt |
25.36Кб |
5. Industries and Sectors (OBJ. 3.3).mp4 |
102.46Мб |
5. Industries and Sectors (OBJ. 3.3).srt |
11.74Кб |
5. Layer 2 Segmentation (OBJ 1.1).mp4 |
112.28Мб |
5. Layer 2 Segmentation (OBJ 1.1).srt |
12.34Кб |
5. NetFlow (OBJ. 2.2).mp4 |
147.92Мб |
5. NetFlow (OBJ. 2.2).srt |
16.90Кб |
5. Performance Design (OBJ 1.2).mp4 |
130.72Мб |
5. Performance Design (OBJ 1.2).srt |
13.27Кб |
5. Performing Malware Analysis (OBJ. 2.9).mp4 |
181.25Мб |
5. Performing Malware Analysis (OBJ. 2.9).srt |
50.80Кб |
5. Provider Limitations (OBJ 1.6).mp4 |
62.50Мб |
5. Provider Limitations (OBJ 1.6).srt |
7.07Кб |
5. Risk Handling (OBJ. 4.1).mp4 |
187.35Мб |
5. Risk Handling (OBJ. 4.1).srt |
22.53Кб |
5. Scenario Planning (OBJ 4.1).mp4 |
182.38Мб |
5. Scenario Planning (OBJ 4.1).srt |
20.88Кб |
5. Security Configurations (OBJ. 3.1).mp4 |
175.25Мб |
5. Security Configurations (OBJ. 3.1).srt |
18.76Кб |
5. Security Settings (OBJ. 3.2).mp4 |
121.59Мб |
5. Security Settings (OBJ. 3.2).srt |
12.49Кб |
5. Shared Responsibility Model (OBJ 4.2).mp4 |
105.77Мб |
5. Shared Responsibility Model (OBJ 4.2).srt |
12.79Кб |
5. Software Assurance (OBJ 1.3).mp4 |
187.40Мб |
5. Software Assurance (OBJ 1.3).srt |
21.79Кб |
5. Software-Defied Networking (SDN) (OBJ. 3.4).mp4 |
147.83Мб |
5. Software-Defied Networking (SDN) (OBJ. 3.4).srt |
17.01Кб |
5. SQL Injections (OBJ. 2.5).mp4 |
154.54Мб |
5. SQL Injections (OBJ. 2.5).srt |
16.05Кб |
5. Standards (OBJ. 4.3).mp4 |
131.70Мб |
5. Standards (OBJ. 4.3).srt |
14.38Кб |
5. Symmetric Algorithms (OBJ. 3.6).mp4 |
125.53Мб |
5. Symmetric Algorithms (OBJ. 3.6).srt |
2.77Кб |
5. Threat Actors (OBJ. 2.1).mp4 |
201.00Мб |
5. Threat Actors (OBJ. 2.1).srt |
22.66Кб |
50 |
419.99Кб |
51 |
564.53Кб |
52 |
1.40Мб |
53 |
1.54Мб |
54 |
331.96Кб |
55 |
1.64Мб |
56 |
350.95Кб |
57 |
614.87Кб |
58 |
668.31Кб |
59 |
1.38Мб |
6 |
565.86Кб |
6. Baselins and Templates (OBJ 1.3).mp4 |
139.71Мб |
6. Baselins and Templates (OBJ 1.3).srt |
16.52Кб |
6. Checkpoint Operational Technologies.html |
160б |
6. Ciphers and Certificates (OBJ. 2.5).mp4 |
235.65Мб |
6. Ciphers and Certificates (OBJ. 2.5).srt |
24.34Кб |
6. Configuring Firewalls (OBJ 1.1).mp4 |
53.59Мб |
6. Configuring Firewalls (OBJ 1.1).srt |
14.80Кб |
6. Contracts and Agreements (OBJ. 4.3).mp4 |
201.82Мб |
6. Contracts and Agreements (OBJ. 4.3).srt |
24.09Кб |
6. Cracking Weak Passwords (OBJ 1.5).mp4 |
24.13Мб |
6. Cracking Weak Passwords (OBJ 1.5).srt |
5.53Кб |
6. Cryptographic Use Cases (OBJ 1.7).mp4 |
135.50Мб |
6. Cryptographic Use Cases (OBJ 1.7).srt |
14.32Кб |
6. Data Destruction (OBJ. 4.3).mp4 |
62.55Мб |
6. Data Destruction (OBJ. 4.3).srt |
6.91Кб |
6. Data Encryption (OBJ 1.4).mp4 |
162.02Мб |
6. Data Encryption (OBJ 1.4).srt |
17.46Кб |
6. DNS Protection (OBJ. 3.1).mp4 |
70.97Мб |
6. DNS Protection (OBJ. 3.1).srt |
6.84Кб |
6. Extending Controls (OBJ 1.6).mp4 |
108.16Мб |
6. Extending Controls (OBJ 1.6).srt |
11.65Кб |
6. Forensic Analysis Tools (OBJ. 2.9).mp4 |
172.71Мб |
6. Forensic Analysis Tools (OBJ. 2.9).srt |
19.64Кб |
6. IPSec (OBJ. 3.6).mp4 |
317.12Мб |
6. IPSec (OBJ. 3.6).srt |
35.19Кб |
6. Log Collection and Analysis (OBJ. 3.4).mp4 |
96.02Мб |
6. Log Collection and Analysis (OBJ. 3.4).srt |
10.61Кб |
6. Logs (OBJ. 2.2).mp4 |
148.80Мб |
6. Logs (OBJ. 2.2).srt |
16.31Кб |
6. Mandatory Access Controls (MAC) (OBJ. 3.2).mp4 |
142.55Мб |
6. Mandatory Access Controls (MAC) (OBJ. 3.2).srt |
15.03Кб |
6. Network Segmentation (OBJ 1.1).mp4 |
284.51Мб |
6. Network Segmentation (OBJ 1.1).srt |
31.51Кб |
6. Passwordless Authentication (OBJ 1.8).mp4 |
112.91Мб |
6. Passwordless Authentication (OBJ 1.8).srt |
12.48Кб |
6. Playbooks (OBJ. 2.7).mp4 |
179.71Мб |
6. Playbooks (OBJ. 2.7).srt |
21.00Кб |
6. Protocol Analysis (OBJ. 2.4).mp4 |
170.48Мб |
6. Protocol Analysis (OBJ. 2.4).srt |
18.79Кб |
6. Risk Tracking (OBJ. 4.1).mp4 |
109.44Мб |
6. Risk Tracking (OBJ. 4.1).srt |
12.09Кб |
6. Security Automation (OBJ. 2.6).mp4 |
230.05Мб |
6. Security Automation (OBJ. 2.6).srt |
25.06Кб |
6. Security Controls (OBJ 4.1).mp4 |
200.07Мб |
6. Security Controls (OBJ 4.1).srt |
22.95Кб |
6. Steganography.mp4 |
38.39Мб |
6. Steganography.srt |
8.42Кб |
6. Stream Ciphers (OBJ. 3.6).mp4 |
96.46Мб |
6. Stream Ciphers (OBJ. 3.6).srt |
10.21Кб |
6. Testing Plans (OBJ 4.4).mp4 |
155.59Мб |
6. Testing Plans (OBJ 4.4).srt |
18.96Кб |
6. Threat Management Frameworks (OBJ. 2.1).mp4 |
234.63Мб |
6. Threat Management Frameworks (OBJ. 2.1).srt |
32.04Кб |
6. Trust Models (OBJ. 3.5).mp4 |
96.22Мб |
6. Trust Models (OBJ. 3.5).srt |
11.53Кб |
6. Viability and Support (OBJ 4.2).mp4 |
235.97Мб |
6. Viability and Support (OBJ 4.2).srt |
26.22Кб |
6. Virtualization (OBJ 1.2).mp4 |
179.99Мб |
6. Virtualization (OBJ 1.2).srt |
19.13Кб |
6. XML Injections (OBJ. 2.5).mp4 |
138.33Мб |
6. XML Injections (OBJ. 2.5).srt |
14.87Кб |
60 |
1.07Мб |
61 |
799.32Кб |
62 |
1.16Мб |
63 |
1.62Мб |
64 |
1.94Мб |
65 |
229.31Кб |
66 |
767.25Кб |
67 |
5.50Кб |
68 |
295.45Кб |
69 |
530.99Кб |
7 |
908.68Кб |
7. Best Practices (OBJ 1.3).mp4 |
132.39Мб |
7. Best Practices (OBJ 1.3).srt |
14.67Кб |
7. Block Ciphers (OBJ. 3.6).mp4 |
211.33Мб |
7. Block Ciphers (OBJ. 3.6).srt |
23.78Кб |
7. Certificate Management (OBJ. 3.5).mp4 |
59.42Мб |
7. Certificate Management (OBJ. 3.5).srt |
6.81Кб |
7. Checkpoint Business Continuity.html |
160б |
7. Checkpoint Digital Forensics.html |
160б |
7. Checkpoint Incident Response.html |
160б |
7. Cloud Access Security Broker (CASB) (OBJ. 3.4).mp4 |
134.02Мб |
7. Cloud Access Security Broker (CASB) (OBJ. 3.4).srt |
15.05Кб |
7. Data Loss Prevention (DLP) (OBJ 1.4).mp4 |
218.21Мб |
7. Data Loss Prevention (DLP) (OBJ 1.4).srt |
23.16Кб |
7. Data Ownership (OBJ. 4.3).mp4 |
120.48Мб |
7. Data Ownership (OBJ. 4.3).srt |
13.60Кб |
7. Dependencies (OBJ 4.2).mp4 |
102.31Мб |
7. Dependencies (OBJ 4.2).srt |
11.43Кб |
7. Deployment Options (OBJ. 3.1).mp4 |
100.22Мб |
7. Deployment Options (OBJ. 3.1).srt |
9.99Кб |
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).mp4 |
76.63Мб |
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).srt |
7.18Кб |
7. Homomorphic Encryption (OBJ 1.8).mp4 |
75.73Мб |
7. Homomorphic Encryption (OBJ 1.8).srt |
8.13Кб |
7. Implement Network Segmentation (OBJ 1.1).mp4 |
54.46Мб |
7. Implement Network Segmentation (OBJ 1.1).srt |
21.71Кб |
7. Improper Headers (OBJ. 2.5).mp4 |
127.27Мб |
7. Improper Headers (OBJ. 2.5).srt |
13.84Кб |
7. IoC Notifications (OBJ. 2.2).mp4 |
162.59Мб |
7. IoC Notifications (OBJ. 2.2).srt |
19.53Кб |
7. Legal Considerations (OBJ. 4.3).mp4 |
152.16Мб |
7. Legal Considerations (OBJ. 4.3).srt |
17.63Кб |
7. Multifactor Authentication (OBJ 1.5).mp4 |
181.78Мб |
7. Multifactor Authentication (OBJ 1.5).srt |
19.63Кб |
7. Other Injection Attacks (OBJ. 2.5).mp4 |
91.69Мб |
7. Other Injection Attacks (OBJ. 2.5).srt |
10.07Кб |
7. Physical Security (OBJ. 2.6).mp4 |
253.90Мб |
7. Physical Security (OBJ. 2.6).srt |
25.06Кб |
7. PKI Use Cases (OBJ 1.7).mp4 |
186.62Мб |
7. PKI Use Cases (OBJ 1.7).srt |
19.08Кб |
7. Provision and Deprovision (OBJ 1.6).mp4 |
64.73Мб |
7. Provision and Deprovision (OBJ 1.6).srt |
7.07Кб |
7. Proxies (OBJ 1.1).mp4 |
156.32Мб |
7. Proxies (OBJ 1.1).srt |
16.22Кб |
7. Risk Assessment (OBJ. 4.1).mp4 |
390.82Мб |
7. Risk Assessment (OBJ. 4.1).srt |
45.12Кб |
7. Secure Boot (OBJ. 3.2).mp4 |
124.88Мб |
7. Secure Boot (OBJ. 3.2).srt |
12.69Кб |
7. Securing VMs (OBJ 1.2).mp4 |
36.66Мб |
7. Securing VMs (OBJ 1.2).srt |
9.69Кб |
7. Security Solutions (OBJ 4.1).mp4 |
193.68Мб |
7. Security Solutions (OBJ 4.1).srt |
21.90Кб |
7. TCPDump (OBJ. 2.4).mp4 |
75.74Мб |
7. TCPDump (OBJ. 2.4).srt |
17.42Кб |
7. Using Aircrack-ng (OBJ. 2.9).mp4 |
84.56Мб |
7. Using Aircrack-ng (OBJ. 2.9).srt |
16.59Кб |
7. Vulnerability Management Activities (OBJ. 2.3).mp4 |
254.06Мб |
7. Vulnerability Management Activities (OBJ. 2.3).srt |
29.45Кб |
70 |
1.85Мб |
71 |
68.39Кб |
72 |
770.74Кб |
73 |
1.25Мб |
74 |
1.29Мб |
75 |
1.66Мб |
76 |
1.93Мб |
77 |
346.75Кб |
78 |
937.87Кб |
79 |
1.52Мб |
8 |
40.13Кб |
8. Authentication Bypass (OBJ. 2.5).mp4 |
142.05Мб |
8. Authentication Bypass (OBJ. 2.5).srt |
16.35Кб |
8. Authentication Protocols (OBJ 1.5).mp4 |
210.76Мб |
8. Authentication Protocols (OBJ 1.5).srt |
22.47Кб |
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).mp4 |
82.53Мб |
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).srt |
9.39Кб |
8. Checkpoint Cryptography.html |
160б |
8. Checkpoint Hashing and Symmetric Algorithms.html |
160б |
8. Cloud Misconfigurations (OBJ. 3.4).mp4 |
238.01Мб |
8. Cloud Misconfigurations (OBJ. 3.4).srt |
27.43Кб |
8. Considerations (OBJ 4.2).mp4 |
232.51Мб |
8. Considerations (OBJ 4.2).srt |
26.57Кб |
8. Containerization (OBJ 1.2).mp4 |
124.84Мб |
8. Containerization (OBJ 1.2).srt |
14.30Кб |
8. Cost of a Data Breach (OBJ 4.1).mp4 |
132.51Мб |
8. Cost of a Data Breach (OBJ 4.1).srt |
13.54Кб |
8. Data Sovereignty (OBJ. 4.3).mp4 |
71.12Мб |
8. Data Sovereignty (OBJ. 4.3).srt |
8.18Кб |
8. DLP Detection (OBJ 1.4).mp4 |
142.62Мб |
8. DLP Detection (OBJ 1.4).srt |
15.55Кб |
8. Forward Secrecy (OBJ. 3.6).mp4 |
73.95Мб |
8. Forward Secrecy (OBJ. 3.6).srt |
8.53Кб |
8. Gateways (OBJ 1.1).mp4 |
99.85Мб |
8. Gateways (OBJ 1.1).srt |
10.58Кб |
8. Hardware Encryption (OBJ. 3.2).mp4 |
103.23Мб |
8. Hardware Encryption (OBJ. 3.2).srt |
10.77Кб |
8. Imaging Tools (OBJ. 2.9).mp4 |
168.60Мб |
8. Imaging Tools (OBJ. 2.9).srt |
16.82Кб |
8. Integrating Applications (OBJ 1.3).mp4 |
99.06Мб |
8. Integrating Applications (OBJ 1.3).srt |
9.85Кб |
8. Integrating Industries (OBJ. 4.3).mp4 |
74.33Мб |
8. Integrating Industries (OBJ. 4.3).srt |
8.54Кб |
8. Lock Picking (OBJ. 2.6).mp4 |
36.67Мб |
8. Lock Picking (OBJ. 2.6).srt |
3.74Кб |
8. Reconnaissance Concerns (OBJ. 3.1).mp4 |
175.93Мб |
8. Reconnaissance Concerns (OBJ. 3.1).srt |
18.84Кб |
8. Response to IoCs (OBJ. 2.2).mp4 |
111.52Мб |
8. Response to IoCs (OBJ. 2.2).srt |
12.45Кб |
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).mp4 |
154.93Мб |
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).srt |
16.21Кб |
8. Server Segmentation (OBJ 1.1).mp4 |
229.82Мб |
8. Server Segmentation (OBJ 1.1).srt |
25.23Кб |
8. Software Composition (OBJ. 2.5).mp4 |
207.96Мб |
8. Software Composition (OBJ. 2.5).srt |
23.47Кб |
8. Storage Models (OBJ 1.6).mp4 |
114.62Мб |
8. Storage Models (OBJ 1.6).srt |
11.91Кб |
8. VirtualAugmented Reality (OBJ 1.8).mp4 |
98.55Мб |
8. VirtualAugmented Reality (OBJ 1.8).srt |
11.15Кб |
8. When Risk Management Fails (OBJ. 4.1).mp4 |
81.87Мб |
8. When Risk Management Fails (OBJ. 4.1).srt |
8.62Кб |
8. Wireshark (OBJ. 2.4).mp4 |
88.41Мб |
8. Wireshark (OBJ. 2.4).srt |
20.41Кб |
80 |
1.81Мб |
81 |
1.40Мб |
82 |
148.95Кб |
83 |
1.00Мб |
84 |
1.09Мб |
85 |
1.22Мб |
86 |
1.41Мб |
87 |
1.98Мб |
88 |
353.68Кб |
89 |
615.09Кб |
9 |
1.35Мб |
9. 3D Printing (OBJ 1.8).mp4 |
66.76Мб |
9. 3D Printing (OBJ 1.8).srt |
7.30Кб |
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).mp4 |
40.20Мб |
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).srt |
4.29Кб |
9. Checkpoint Cloud Technologies.html |
160б |
9. Checkpoint Data Considerations.html |
160б |
9. Checkpoint Infrastructure Design.html |
160б |
9. Checkpoint Policies and Frameworks.html |
160б |
9. Checkpoint Risk Management.html |
160б |
9. Checkpoint Risk Reduction.html |
160б |
9. Checkpoint Risk Strategies.html |
160б |
9. Checkpoint Software Applications.html |
160б |
9. Checkpoint Threat and Vulnerability Management.html |
160б |
9. Collecting and Validating Evidence (OBJ. 2.9).mp4 |
103.24Мб |
9. Collecting and Validating Evidence (OBJ. 2.9).srt |
19.01Кб |
9. Data Loss Detection (OBJ 1.4).mp4 |
247.50Мб |
9. Data Loss Detection (OBJ 1.4).srt |
28.05Кб |
9. Endpoint Protections (OBJ. 3.2).mp4 |
213.38Мб |
9. Endpoint Protections (OBJ. 3.2).srt |
26.17Кб |
9. Federation (OBJ 1.5).mp4 |
147.91Мб |
9. Federation (OBJ 1.5).srt |
16.16Кб |
9. IDS and IPS (OBJ 1.1).mp4 |
139.29Мб |
9. IDS and IPS (OBJ 1.1).srt |
14.62Кб |
9. Mobile Security (OBJ. 3.1).mp4 |
165.85Мб |
9. Mobile Security (OBJ. 3.1).srt |
18.14Кб |
9. Nmap (OBJ. 2.4).mp4 |
83.97Мб |
9. Nmap (OBJ. 2.4).srt |
21.17Кб |
9. Protecting Web Traffic (OBJ. 3.5).mp4 |
74.33Мб |
9. Protecting Web Traffic (OBJ. 3.5).srt |
8.15Кб |
9. Security Appliances (OBJ. 2.2).mp4 |
134.61Мб |
9. Security Appliances (OBJ. 2.2).srt |
34.57Кб |
9. Supply Chain (OBJ 4.2).mp4 |
130.89Мб |
9. Supply Chain (OBJ 4.2).srt |
16.00Кб |
9. Virtualization (OBJ 1.6).mp4 |
172.07Мб |
9. Virtualization (OBJ 1.6).srt |
18.65Кб |
9. Vulnerable Web Applications (OBJ. 2.5).mp4 |
253.91Мб |
9. Vulnerable Web Applications (OBJ. 2.5).srt |
27.00Кб |
9. Web Application Vulnerabilities (OBJ. 2.5).mp4 |
53.44Мб |
9. Web Application Vulnerabilities (OBJ. 2.5).srt |
20.29Кб |
9. Zero Trust (OBJ 1.1).mp4 |
144.80Мб |
9. Zero Trust (OBJ 1.1).srt |
15.80Кб |
90 |
1.30Мб |
91 |
1.68Мб |
92 |
415.94Кб |
93 |
1.07Мб |
94 |
1.39Мб |
95 |
1.46Мб |
96 |
1.63Мб |
97 |
423.26Кб |
98 |
1.31Мб |
99 |
1.84Мб |
TutsNode.com.txt |
63б |