Общая информация
Название CASP+ (CAS-004) Complete Course & Full-Length Practice Exam
Тип
Размер 37.16Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 46б
1 57б
1. Analyzing Vulnerabilities.mp4 29.40Мб
1. Analyzing Vulnerabilities.srt 3.08Кб
1. Asymmetric Algorithms.mp4 47.89Мб
1. Asymmetric Algorithms.srt 4.49Кб
1. Attacking Vulnerabilities.mp4 26.96Мб
1. Attacking Vulnerabilities.srt 2.85Кб
1. Authentication and Authorization (OBJ 1.5).mp4 37.22Мб
1. Authentication and Authorization (OBJ 1.5).srt 3.71Кб
1. Business Continuity (OBJ 4.4).mp4 25.23Мб
1. Business Continuity (OBJ 4.4).srt 2.81Кб
1. Cloud and Virtualization (OBJ 1.6).mp4 23.57Мб
1. Cloud and Virtualization (OBJ 1.6).srt 2.39Кб
1. Cloud Technologies.mp4 57.88Мб
1. Cloud Technologies.srt 5.84Кб
1. Conclusion.mp4 225.79Мб
1. Conclusion.srt 26.14Кб
1. Cryptography (OBJ 1.7).mp4 38.69Мб
1. Cryptography (OBJ 1.7).srt 3.89Кб
1. Data Considerations (OBJ 4.3).mp4 20.27Мб
1. Data Considerations (OBJ 4.3).srt 2.26Кб
1. Data Security (OBJ 1.4).mp4 78.28Мб
1. Data Security (OBJ 1.4).srt 8.34Кб
1. Digital Forensics.mp4 22.52Мб
1. Digital Forensics.srt 2.30Кб
1. Digital Forensic Tools.mp4 51.83Мб
1. Digital Forensic Tools.srt 4.98Кб
1. Emerging Technology (OBJ 1.8).mp4 93.13Мб
1. Emerging Technology (OBJ 1.8).srt 10.98Кб
1. Endpoint Security Controls.mp4 52.75Мб
1. Endpoint Security Controls.srt 5.28Кб
1. Enterprise Mobility.mp4 57.24Мб
1. Enterprise Mobility.srt 5.78Кб
1. Hashing and Symmetric Algorithms.mp4 25.91Мб
1. Hashing and Symmetric Algorithms.srt 2.77Кб
1. Incident Response.mp4 31.23Мб
1. Incident Response.srt 3.14Кб
1. Indicators of Compromise.mp4 39.36Мб
1. Indicators of Compromise.srt 3.76Кб
1. Infrastructure Design (OBJ 1.2).mp4 24.79Мб
1. Infrastructure Design (OBJ 1.2).srt 2.49Кб
1. Operational Technologies.mp4 45.13Мб
1. Operational Technologies.srt 4.32Кб
1. Policies and Frameworks (OBJ. 4.1 & 4.3).mp4 30.24Мб
1. Policies and Frameworks (OBJ. 4.1 & 4.3).srt 3.09Кб
1. Public Key Infrastructure.mp4 61.75Мб
1. Public Key Infrastructure.srt 6.25Кб
1. Risk Management (OBJ 4.1).mp4 32.45Мб
1. Risk Management (OBJ 4.1).srt 3.58Кб
1. Risk Reduction.mp4 33.41Мб
1. Risk Reduction.srt 3.22Кб
1. Risk Strategies (OBJ 4.1).mp4 33.25Мб
1. Risk Strategies (OBJ 4.1).srt 3.48Кб
1. Securing Architectures (OBJ 1.1).mp4 26.71Мб
1. Securing Architectures (OBJ 1.1).srt 2.80Кб
1. Securing Networks (OBJ 1.1).mp4 149.57Мб
1. Securing Networks (OBJ 1.1).srt 16.43Кб
1. Software Applications (OBJ 1.3).mp4 58.29Мб
1. Software Applications (OBJ 1.3).srt 6.50Кб
1. Threat and Vulnerability Management.mp4 41.91Мб
1. Threat and Vulnerability Management.srt 4.38Кб
1. Vendor Risk (OBJ 4.2).mp4 88.25Мб
1. Vendor Risk (OBJ 4.2).srt 9.81Кб
1. Vulnerability Assessments.mp4 33.78Мб
1. Vulnerability Assessments.srt 3.51Кб
1. Welcome.mp4 184.93Мб
1. Welcome.srt 21.29Кб
10 449.09Кб
10. Analysis Utilities (OBJ. 2.4).mp4 110.13Мб
10. Analysis Utilities (OBJ. 2.4).srt 12.73Кб
10. Auditing Files (OBJ 1.4).mp4 46.96Мб
10. Auditing Files (OBJ 1.4).srt 8.39Кб
10. Checkpoint Analyzing Vulnerabilities.html 160б
10. Checkpoint Cloud and Virtualization.html 160б
10. Checkpoint Enterprise Mobility.html 160б
10. Checkpoint Indicators of Compromise.html 160б
10. Checkpoint Vendor Risk.html 160б
10. Collection Tools (OBJ. 2.9).mp4 133.14Мб
10. Collection Tools (OBJ. 2.9).srt 13.45Кб
10. Key Stretching (OBJ. 3.6).mp4 94.89Мб
10. Key Stretching (OBJ. 3.6).srt 10.76Кб
10. Logging and Monitoring (OBJ. 3.2).mp4 133.20Мб
10. Logging and Monitoring (OBJ. 3.2).srt 14.98Кб
10. Merging Networks (OBJ 1.1).mp4 118.16Мб
10. Merging Networks (OBJ 1.1).srt 13.69Кб
10. Network Access Control (NAC) (OBJ 1.1).mp4 61.91Мб
10. Network Access Control (NAC) (OBJ 1.1).srt 6.72Кб
10. Quantum Computing (OBJ 1.8).mp4 121.07Мб
10. Quantum Computing (OBJ 1.8).srt 12.89Кб
10. Root of Trust (OBJ 1.5).mp4 93.57Мб
10. Root of Trust (OBJ 1.5).srt 9.94Кб
10. Troubleshooting Certificates (OBJ. 3.7).mp4 115.07Мб
10. Troubleshooting Certificates (OBJ. 3.7).srt 13.32Кб
10. VM Attacks (OBJ. 2.5).mp4 100.86Мб
10. VM Attacks (OBJ. 2.5).srt 11.82Кб
100 714.24Кб
101 721.70Кб
102 848.46Кб
103 1.21Мб
104 438.66Кб
105 1.20Мб
106 86.83Кб
107 95.75Кб
108 174.20Кб
109 364.59Кб
11 96.76Кб
11. Attestation (OBJ 1.5).mp4 48.93Мб
11. Attestation (OBJ 1.5).srt 5.38Кб
11. Checkpoint Asymmetric Algorithms.html 160б
11. Checkpoint Data Security.html 160б
11. Checkpoint Emerging Technology.html 160б
11. Configuring SIEM Agents (OBJ. 3.2).mp4 141.36Мб
11. Configuring SIEM Agents (OBJ. 3.2).srt 41.05Кб
11. Network Attacks (OBJ. 2.5).mp4 239.52Мб
11. Network Attacks (OBJ. 2.5).srt 26.60Кб
11. Remote Access (OBJ 1.1).mp4 195.45Мб
11. Remote Access (OBJ 1.1).srt 20.51Кб
11. Software-Defined Networking (SDN) (OBJ 1.1).mp4 117.52Мб
11. Software-Defined Networking (SDN) (OBJ 1.1).srt 13.16Кб
11. Troubleshooting Keys (OBJ. 3.7).mp4 75.27Мб
11. Troubleshooting Keys (OBJ. 3.7).srt 8.76Кб
11. Using Collection Tools (OBJ. 2.10).mp4 45.35Мб
11. Using Collection Tools (OBJ. 2.10).srt 10.27Кб
11. Vulnerability Scanning (OBJ. 2.4).mp4 81.97Мб
11. Vulnerability Scanning (OBJ. 2.4).srt 20.84Кб
110 806.29Кб
111 1.20Мб
112 33.82Кб
113 521.96Кб
114 581.33Кб
115 708.60Кб
116 1.38Мб
117 1.45Мб
118 1.95Мб
119 4.80Кб
12 105.46Кб
12. Analyzing Scan Outputs (OBJ. 2.4).mp4 80.55Мб
12. Analyzing Scan Outputs (OBJ. 2.4).srt 31.19Кб
12. Analyzing Web Applications (OBJ. 2.5).mp4 136.72Мб
12. Analyzing Web Applications (OBJ. 2.5).srt 34.38Кб
12. Checkpoint Digital Forensic Tools.html 160б
12. Checkpoint Public Key Infrastructure.html 160б
12. Checkpoint Securing Architectures.html 160б
12. Identity Proofing (OBJ 1.5).mp4 77.97Мб
12. Identity Proofing (OBJ 1.5).srt 8.71Кб
12. Resiliency (OBJ. 3.2).mp4 132.80Мб
12. Resiliency (OBJ. 3.2).srt 15.02Кб
12. Unified Communications (OBJ 1.1).mp4 417.06Мб
12. Unified Communications (OBJ 1.1).srt 45.35Кб
120 656.52Кб
121 292.22Кб
122 729.47Кб
123 1.32Мб
124 1.61Мб
125 1.67Мб
126 1.28Мб
127 1.30Мб
128 410.43Кб
129 514.33Кб
13 520.65Кб
13. Checkpoint Authentication and Authorization.html 160б
13. Checkpoint Endpoint Security Controls.html 160б
13. Checkpoint Vulnerability Assessments.html 160б
13. Cloud vs On-premise (OBJ 1.1).mp4 105.64Мб
13. Cloud vs On-premise (OBJ 1.1).srt 11.95Кб
13. Social Engineering (OBJ. 2.5).mp4 157.40Мб
13. Social Engineering (OBJ. 2.5).srt 17.48Кб
130 1.39Мб
131 1.98Мб
132 820.99Кб
133 876.33Кб
134 1.20Мб
135 1.49Мб
136 1.61Мб
137 309.62Кб
138 424.60Кб
139 1.11Мб
14 1.22Мб
14. DNSSEC (OBJ 1.1).mp4 92.83Мб
14. DNSSEC (OBJ 1.1).srt 8.79Кб
14. Phishing Campaigns (OBJ. 2.5).mp4 46.06Мб
14. Phishing Campaigns (OBJ. 2.5).srt 12.26Кб
140 1.27Мб
141 1.28Мб
142 746.90Кб
143 998.03Кб
144 480.65Кб
145 1.12Мб
146 1.16Мб
147 416.23Кб
148 744.45Кб
149 951.67Кб
15 514.08Кб
15. Checkpoint Attacking Vulnerabilities.html 160б
15. Load Balancer (OBJ 1.1).mp4 147.21Мб
15. Load Balancer (OBJ 1.1).srt 15.84Кб
150 1.07Мб
151 1.52Мб
152 1.93Мб
153 1.84Мб
154 209.18Кб
155 470.52Кб
156 490.33Кб
157 950.73Кб
158 1.38Мб
159 1.81Мб
16 126.23Кб
16. Checkpoint Securing Networks.html 160б
160 1.09Мб
161 1.72Мб
162 494.47Кб
163 1.57Мб
164 1.87Мб
165 71.12Кб
166 85.60Кб
167 571.78Кб
168 1.84Мб
169 1.91Мб
17 652.71Кб
170 333.30Кб
171 232.51Кб
172 372.05Кб
173 908.65Кб
174 1.62Мб
175 621.89Кб
176 777.57Кб
177 785.54Кб
178 1.54Мб
179 1.69Мб
18 287.28Кб
180 194.97Кб
181 1.14Мб
182 1.62Мб
183 1.78Мб
184 86.27Кб
185 157.30Кб
186 211.61Кб
187 966.83Кб
188 1.45Мб
189 1.33Мб
19 488.13Кб
190 1.54Мб
191 1.75Мб
192 1.78Мб
193 1.98Мб
194 788.88Кб
195 1.11Мб
196 1.93Мб
197 442.99Кб
198 893.26Кб
199 1.17Мб
2 111б
2.1 CASP (CAS-004) Objectives.pdf 1.50Мб
2.2 CompTIA CASP+ (CAS-004) Study Notes.pdf 4.09Мб
2. Access Control (OBJ 1.5).mp4 101.81Мб
2. Access Control (OBJ 1.5).srt 11.66Кб
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).mp4 192.36Мб
2. Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1.8).srt 22.53Кб
2. Asset Value (OBJ 4.1).mp4 88.19Мб
2. Asset Value (OBJ 4.1).srt 9.44Кб
2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).mp4 171.08Мб
2. Business ContinuityDisaster Recovery (BCDR) (OBJ. 3.4).srt 19.23Кб
2. Business Continuity Plan (OBJ 4.4).mp4 299.78Мб
2. Business Continuity Plan (OBJ 4.4).srt 35.58Кб
2. Business Models (OBJ 4.2).mp4 239.34Мб
2. Business Models (OBJ 4.2).srt 28.45Кб
2. CASP+ (CAS-004) Practice Exam.html 160б
2. Cloud Deployment Models (OBJ 1.6).mp4 96.25Мб
2. Cloud Deployment Models (OBJ 1.6).srt 11.04Кб
2. Data Life Cycle (OBJ 1.4).mp4 229.21Мб
2. Data Life Cycle (OBJ 1.4).srt 24.98Кб
2. Data Security (OBJ. 4.3).mp4 79.97Мб
2. Data Security (OBJ. 4.3).srt 8.78Кб
2. Deceptive Technologies (OBJ. 2.6).mp4 105.11Мб
2. Deceptive Technologies (OBJ. 2.6).srt 11.87Кб
2. Device Hardening (OBJ. 3.2).mp4 182.84Мб
2. Device Hardening (OBJ. 3.2).srt 19.89Кб
2. Directory Traversals (OBJ. 2.5).mp4 211.66Мб
2. Directory Traversals (OBJ. 2.5).srt 20.90Кб
2. Download Your Free Study Guide.html 76б
2. Embedded Systems (OBJ. 3.3).mp4 226.52Мб
2. Embedded Systems (OBJ. 3.3).srt 24.87Кб
2. Enterprise Mobility Management (EMM) (OBJ. 3.1).mp4 211.05Мб
2. Enterprise Mobility Management (EMM) (OBJ. 3.1).srt 23.03Кб
2. Forensic Process (OBJ. 2.8).mp4 100.38Мб
2. Forensic Process (OBJ. 2.8).srt 11.86Кб
2. Forensic Workstations (OBJ. 2.9).mp4 107.67Мб
2. Forensic Workstations (OBJ. 2.9).srt 12.50Кб
2. Hashing (OBJ. 3.6).mp4 147.64Мб
2. Hashing (OBJ. 3.6).srt 16.17Кб
2. Penetration Test (OBJ. 2.4).mp4 103.39Мб
2. Penetration Test (OBJ. 2.4).srt 11.66Кб
2. PKI Components (OBJ. 3.5).mp4 223.24Мб
2. PKI Components (OBJ. 3.5).srt 24.53Кб
2. Policies (OBJ. 4.1).mp4 261.96Мб
2. Policies (OBJ. 4.1).srt 32.80Кб
2. Privacy and Confidentiality (OBJ 1.7).mp4 143.97Мб
2. Privacy and Confidentiality (OBJ 1.7).srt 14.67Кб
2. Race Conditions (OBJ. 2.5).mp4 104.38Мб
2. Race Conditions (OBJ. 2.5).srt 11.54Кб
2. Risk Strategies (OBJ. 4.1).mp4 96.67Мб
2. Risk Strategies (OBJ. 4.1).srt 11.76Кб
2. Scalability (OBJ 1.2).mp4 121.27Мб
2. Scalability (OBJ 1.2).srt 12.67Кб
2. Switches (OBJ 1.1).mp4 153.59Мб
2. Switches (OBJ 1.1).srt 17.36Кб
2. Systems Development Life Cycle (OBJ 1.3).mp4 143.31Мб
2. Systems Development Life Cycle (OBJ 1.3).srt 16.63Кб
2. Threat Intelligence (OBJ. 2.1).mp4 135.60Мб
2. Threat Intelligence (OBJ. 2.1).srt 15.86Кб
2. Traffic Mirroring (OBJ 1.1).mp4 94.07Мб
2. Traffic Mirroring (OBJ 1.1).srt 10.28Кб
2. Triage (OBJ. 2.7).mp4 174.75Мб
2. Triage (OBJ. 2.7).srt 19.19Кб
2. Types of IoCs (OBJ. 2.2).mp4 61.96Мб
2. Types of IoCs (OBJ. 2.2).srt 9.15Кб
2. Using Asymmetric Algortihms.mp4 200.81Мб
2. Using Asymmetric Algortihms.srt 22.14Кб
20 671.26Кб
200 322.42Кб
201 389.94Кб
202 1.97Мб
203 1.59Мб
204 1.75Мб
205 1.81Мб
206 1.44Мб
207 1.55Мб
208 26.58Кб
209 1.47Мб
21 1.87Мб
210 34.73Кб
211 134.37Кб
212 1.43Мб
213 1.45Мб
214 31.64Кб
215 1.72Мб
216 33.90Кб
217 1.37Мб
218 1.69Мб
219 263.59Кб
22 1.99Мб
220 272.83Кб
221 747.88Кб
222 1.26Мб
223 1.45Мб
224 1.67Мб
225 1.67Мб
226 51.30Кб
227 1.00Мб
228 897.18Кб
229 1.03Мб
23 1.44Мб
230 1.24Мб
231 1.47Мб
232 1.07Мб
233 1.27Мб
234 1.45Мб
235 1.50Мб
236 43.04Кб
237 97.23Кб
238 256.92Кб
239 590.63Кб
24 33.58Кб
240 1.58Мб
241 1.71Мб
242 1.77Мб
243 120.17Кб
244 777.54Кб
245 1.54Мб
246 1.91Мб
247 415.97Кб
248 576.50Кб
249 1.25Мб
25 358.61Кб
250 178.90Кб
251 1.07Мб
252 112.59Кб
253 1.04Мб
254 1.94Мб
255 664.35Кб
256 888.45Кб
257 90.50Кб
258 1.80Мб
259 658.88Кб
26 1.37Мб
260 1.31Мб
261 1.61Мб
262 794.18Кб
263 1.33Мб
264 1.34Мб
265 1.72Мб
266 224.52Кб
267 602.22Кб
268 765.58Кб
269 1.55Мб
27 645.38Кб
270 785.65Кб
271 1.76Мб
272 612.92Кб
273 1.28Мб
274 1.04Мб
275 1.29Мб
276 92.68Кб
277 785.93Кб
278 1.21Мб
279 1.28Мб
28 1.49Мб
280 1.87Мб
281 437.05Кб
282 1.48Мб
283 1.73Мб
29 1.95Мб
3 78б
3. Access Control (OBJ 4.1).mp4 136.70Мб
3. Access Control (OBJ 4.1).srt 14.94Кб
3. Buffer Overflows (OBJ. 2.5).mp4 271.11Мб
3. Buffer Overflows (OBJ. 2.5).srt 29.78Кб
3. Business Impact Analysis (OBJ 4.4).mp4 299.72Мб
3. Business Impact Analysis (OBJ 4.4).srt 33.08Кб
3. Calculating Hash Digests (OBJ. 3.6).mp4 34.28Мб
3. Calculating Hash Digests (OBJ. 3.6).srt 6.16Кб
3. Chain of Custody (OBJ. 2.8).mp4 154.37Мб
3. Chain of Custody (OBJ. 2.8).srt 17.48Кб
3. Checkpoint Introduction.html 160б
3. Cloud Encryption (OBJ. 3.4).mp4 114.19Мб
3. Cloud Encryption (OBJ. 3.4).srt 12.83Кб
3. Cloud Service Models (OBJ 1.6).mp4 109.93Мб
3. Cloud Service Models (OBJ 1.6).srt 12.50Кб
3. Communication Plan (OBJ. 2.7).mp4 219.69Мб
3. Communication Plan (OBJ. 2.7).srt 25.04Кб
3. Credential Management (OBJ 1.5).mp4 95.23Мб
3. Credential Management (OBJ 1.5).srt 10.52Кб
3. Cross-Site Scripting (XSS) (OBJ. 2.5).mp4 194.46Мб
3. Cross-Site Scripting (XSS) (OBJ. 2.5).srt 21.18Кб
3. Data Classification (OBJ. 4.3).mp4 58.42Мб
3. Data Classification (OBJ. 4.3).srt 6.49Кб
3. Data Classification (OBJ 1.4).mp4 151.30Мб
3. Data Classification (OBJ 1.4).srt 17.11Кб
3. Deep Learning (OBJ 1.8).mp4 194.60Мб
3. Deep Learning (OBJ 1.8).srt 21.99Кб
3. Digital Certificates (OBJ. 3.5).mp4 163.00Мб
3. Digital Certificates (OBJ. 3.5).srt 18.85Кб
3. File Carving Tools (OBJ. 2.9).mp4 76.31Мб
3. File Carving Tools (OBJ. 2.9).srt 7.80Кб
3. Frameworks (OBJ. 4.1).mp4 109.92Мб
3. Frameworks (OBJ. 4.1).srt 12.63Кб
3. ICS and SCADA (OBJ. 3.3).mp4 198.18Мб
3. ICS and SCADA (OBJ. 3.3).srt 23.53Кб
3. Influences (OBJ 4.2).mp4 162.91Мб
3. Influences (OBJ 4.2).srt 18.54Кб
3. Integrity and Non-repudiation (OBJ 1.7).mp4 142.00Мб
3. Integrity and Non-repudiation (OBJ 1.7).srt 14.72Кб
3. Network Sensors (OBJ 1.1).mp4 253.49Мб
3. Network Sensors (OBJ 1.1).srt 28.35Кб
3. PCAP Files (OBJ. 2.2).mp4 90.03Мб
3. PCAP Files (OBJ. 2.2).srt 9.66Кб
3. PenTest Steps (OBJ. 2.4).mp4 152.69Мб
3. PenTest Steps (OBJ. 2.4).srt 18.07Кб
3. Resiliency Issues (OBJ 1.2).mp4 279.45Мб
3. Resiliency Issues (OBJ 1.2).srt 30.16Кб
3. Risk Management Lifecycle (OBJ. 4.1).mp4 256.65Мб
3. Risk Management Lifecycle (OBJ. 4.1).srt 30.99Кб
3. Routers (OBJ 1.1).mp4 179.48Мб
3. Routers (OBJ 1.1).srt 18.76Кб
3. Security Data Analytics (OBJ. 2.6).mp4 172.34Мб
3. Security Data Analytics (OBJ. 2.6).srt 26.60Кб
3. Software Development Life Cycle (OBJ 1.3).mp4 127.03Мб
3. Software Development Life Cycle (OBJ 1.3).srt 14.29Кб
3. SSLTLS and Cipher Suites (OBJ. 3.6).mp4 183.22Мб
3. SSLTLS and Cipher Suites (OBJ. 3.6).srt 18.93Кб
3. Threat Hunting (OBJ. 2.1).mp4 143.43Мб
3. Threat Hunting (OBJ. 2.1).srt 17.57Кб
3. Unnecessary Services (OBJ. 3.2).mp4 58.23Мб
3. Unnecessary Services (OBJ. 3.2).srt 11.84Кб
3. WPA3 (OBJ. 3.1).mp4 156.70Мб
3. WPA3 (OBJ. 3.1).srt 15.37Кб
30 185.39Кб
31 809.19Кб
32 1.48Мб
33 218.70Кб
34 397.13Кб
35 780.73Кб
36 315.33Кб
37 1.79Мб
38 639.23Кб
39 346.99Кб
4
4. Aggregating Risk (OBJ 4.1).mp4 66.53Мб
4. Aggregating Risk (OBJ 4.1).srt 7.92Кб
4. Automation (OBJ 1.2).mp4 138.39Мб
4. Automation (OBJ 1.2).srt 15.40Кб
4. Big Data (OBJ 1.8).mp4 99.92Мб
4. Big Data (OBJ 1.8).srt 10.37Кб
4. Binary Analysis Tools (OBJ. 2.9).mp4 151.17Мб
4. Binary Analysis Tools (OBJ. 2.9).srt 16.56Кб
4. Buffer Overflow Attack (OBJ. 2.6).mp4 91.62Мб
4. Buffer Overflow Attack (OBJ. 2.6).srt 13.16Кб
4. Compliance and Policy (OBJ 1.7).mp4 74.74Мб
4. Compliance and Policy (OBJ 1.7).srt 7.98Кб
4. Conduct Packet Analysis (OBJ. 2.2).mp4 80.57Мб
4. Conduct Packet Analysis (OBJ. 2.2).srt 13.34Кб
4. Connectivity Options (OBJ. 3.1).mp4 189.66Мб
4. Connectivity Options (OBJ. 3.1).srt 19.81Кб
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).mp4 157.65Мб
4. Cross-Site Request Forgery (CSRF) (OBJ. 2.5).srt 18.53Кб
4. Data Types (OBJ. 4.3).mp4 117.54Мб
4. Data Types (OBJ. 4.3).srt 12.93Кб
4. Deployment Considerations (OBJ 1.6).mp4 108.09Мб
4. Deployment Considerations (OBJ 1.6).srt 11.90Кб
4. Development Approaches (OBJ 1.3).mp4 236.56Мб
4. Development Approaches (OBJ 1.3).srt 28.01Кб
4. Host Sensors (OBJ 1.1).mp4 130.73Мб
4. Host Sensors (OBJ 1.1).srt 14.14Кб
4. ICS Protocols (OBJ. 3.3).mp4 233.37Мб
4. ICS Protocols (OBJ. 3.3).srt 26.42Кб
4. Intelligence Collection (OBJ. 2.1).mp4 241.72Мб
4. Intelligence Collection (OBJ. 2.1).srt 28.61Кб
4. Labeling and Tagging (OBJ 1.4).mp4 178.15Мб
4. Labeling and Tagging (OBJ 1.4).srt 19.80Кб
4. Message Authentication (OBJ. 3.6).mp4 74.55Мб
4. Message Authentication (OBJ. 3.6).srt 7.74Кб
4. Order of Volatility (OBJ. 2.8).mp4 138.68Мб
4. Order of Volatility (OBJ. 2.8).srt 16.18Кб
4. Organizational Changes (OBJ 4.2).mp4 131.59Мб
4. Organizational Changes (OBJ 4.2).srt 14.88Кб
4. Password Policies (OBJ 1.5).mp4 171.66Мб
4. Password Policies (OBJ 1.5).srt 18.28Кб
4. Patching (OBJ. 3.2).mp4 99.79Мб
4. Patching (OBJ. 3.2).srt 10.86Кб
4. PenTest Requirements (OBJ. 2.4).mp4 252.78Мб
4. PenTest Requirements (OBJ. 2.4).srt 29.62Кб
4. Preventative Controls (OBJ. 2.6).mp4 110.43Мб
4. Preventative Controls (OBJ. 2.6).srt 12.81Кб
4. Privacy Impact Assessment (OBJ 4.4).mp4 84.45Мб
4. Privacy Impact Assessment (OBJ 4.4).srt 9.83Кб
4. Regulations (OBJ. 4.3).mp4 170.19Мб
4. Regulations (OBJ. 4.3).srt 20.21Кб
4. Risk Types (OBJ. 4.1).mp4 64.93Мб
4. Risk Types (OBJ. 4.1).srt 7.61Кб
4. Serverless Computing (OBJ. 3.4).mp4 195.59Мб
4. Serverless Computing (OBJ. 3.4).srt 21.67Кб
4. SMIME and SSH (OBJ. 3.6).mp4 162.78Мб
4. SMIME and SSH (OBJ. 3.6).srt 18.14Кб
4. Stakeholder Management (OBJ. 2.7).mp4 154.61Мб
4. Stakeholder Management (OBJ. 2.7).srt 17.62Кб
4. Using Digital Certificates (OBJ. 3.5).mp4 120.93Мб
4. Using Digital Certificates (OBJ. 3.5).srt 13.67Кб
4. Wireless and Mesh (OBJ 1.1).mp4 73.00Мб
4. Wireless and Mesh (OBJ 1.1).srt 7.45Кб
40 681.12Кб
41 977.80Кб
42 1.19Мб
43 1.24Мб
44 38.67Кб
45 184.69Кб
46 1.00Мб
47 1.19Мб
48 1.93Мб
49 1.82Мб
5 618.84Кб
5. Application Controls (OBJ. 2.6).mp4 210.81Мб
5. Application Controls (OBJ. 2.6).srt 24.22Кб
5. Authentication and References (OBJ. 2.5).mp4 54.09Мб
5. Authentication and References (OBJ. 2.5).srt 14.06Кб
5. Blockchain & Distributed Consensus (OBJ 1.8).mp4 120.07Мб
5. Blockchain & Distributed Consensus (OBJ 1.8).srt 13.28Кб
5. Code Analysis (OBJ. 2.4).mp4 182.06Мб
5. Code Analysis (OBJ. 2.4).srt 21.09Кб
5. Data Retention (OBJ. 4.3).mp4 150.79Мб
5. Data Retention (OBJ. 4.3).srt 17.75Кб
5. Data States (OBJ 1.7).mp4 151.30Мб
5. Data States (OBJ 1.7).srt 15.75Кб
5. Deidentification (OBJ 1.4).mp4 243.36Мб
5. Deidentification (OBJ 1.4).srt 26.28Кб
5. EAP (OBJ. 3.6).mp4 117.80Мб
5. EAP (OBJ. 3.6).srt 12.60Кб
5. Exploring Server Certificates (OBJ. 3.5).mp4 24.72Мб
5. Exploring Server Certificates (OBJ. 3.5).srt 7.37Кб
5. Firewalls (OBJ 1.1).mp4 245.88Мб
5. Firewalls (OBJ 1.1).srt 26.29Кб
5. Forensic Analysis (OBJ. 2.8).mp4 143.49Мб
5. Forensic Analysis (OBJ. 2.8).srt 15.15Кб
5. Implementing Password Policies (OBJ 1.5).mp4 28.72Мб
5. Implementing Password Policies (OBJ 1.5).srt 10.96Кб
5. Incident Response Plan (OBJ 4.4).mp4 238.13Мб
5. Incident Response Plan (OBJ 4.4).srt 28.15Кб
5. Incident Response Process (OBJ. 2.7).mp4 223.61Мб
5. Incident Response Process (OBJ. 2.7).srt 25.36Кб
5. Industries and Sectors (OBJ. 3.3).mp4 102.46Мб
5. Industries and Sectors (OBJ. 3.3).srt 11.74Кб
5. Layer 2 Segmentation (OBJ 1.1).mp4 112.28Мб
5. Layer 2 Segmentation (OBJ 1.1).srt 12.34Кб
5. NetFlow (OBJ. 2.2).mp4 147.92Мб
5. NetFlow (OBJ. 2.2).srt 16.90Кб
5. Performance Design (OBJ 1.2).mp4 130.72Мб
5. Performance Design (OBJ 1.2).srt 13.27Кб
5. Performing Malware Analysis (OBJ. 2.9).mp4 181.25Мб
5. Performing Malware Analysis (OBJ. 2.9).srt 50.80Кб
5. Provider Limitations (OBJ 1.6).mp4 62.50Мб
5. Provider Limitations (OBJ 1.6).srt 7.07Кб
5. Risk Handling (OBJ. 4.1).mp4 187.35Мб
5. Risk Handling (OBJ. 4.1).srt 22.53Кб
5. Scenario Planning (OBJ 4.1).mp4 182.38Мб
5. Scenario Planning (OBJ 4.1).srt 20.88Кб
5. Security Configurations (OBJ. 3.1).mp4 175.25Мб
5. Security Configurations (OBJ. 3.1).srt 18.76Кб
5. Security Settings (OBJ. 3.2).mp4 121.59Мб
5. Security Settings (OBJ. 3.2).srt 12.49Кб
5. Shared Responsibility Model (OBJ 4.2).mp4 105.77Мб
5. Shared Responsibility Model (OBJ 4.2).srt 12.79Кб
5. Software Assurance (OBJ 1.3).mp4 187.40Мб
5. Software Assurance (OBJ 1.3).srt 21.79Кб
5. Software-Defied Networking (SDN) (OBJ. 3.4).mp4 147.83Мб
5. Software-Defied Networking (SDN) (OBJ. 3.4).srt 17.01Кб
5. SQL Injections (OBJ. 2.5).mp4 154.54Мб
5. SQL Injections (OBJ. 2.5).srt 16.05Кб
5. Standards (OBJ. 4.3).mp4 131.70Мб
5. Standards (OBJ. 4.3).srt 14.38Кб
5. Symmetric Algorithms (OBJ. 3.6).mp4 125.53Мб
5. Symmetric Algorithms (OBJ. 3.6).srt 2.77Кб
5. Threat Actors (OBJ. 2.1).mp4 201.00Мб
5. Threat Actors (OBJ. 2.1).srt 22.66Кб
50 419.99Кб
51 564.53Кб
52 1.40Мб
53 1.54Мб
54 331.96Кб
55 1.64Мб
56 350.95Кб
57 614.87Кб
58 668.31Кб
59 1.38Мб
6 565.86Кб
6. Baselins and Templates (OBJ 1.3).mp4 139.71Мб
6. Baselins and Templates (OBJ 1.3).srt 16.52Кб
6. Checkpoint Operational Technologies.html 160б
6. Ciphers and Certificates (OBJ. 2.5).mp4 235.65Мб
6. Ciphers and Certificates (OBJ. 2.5).srt 24.34Кб
6. Configuring Firewalls (OBJ 1.1).mp4 53.59Мб
6. Configuring Firewalls (OBJ 1.1).srt 14.80Кб
6. Contracts and Agreements (OBJ. 4.3).mp4 201.82Мб
6. Contracts and Agreements (OBJ. 4.3).srt 24.09Кб
6. Cracking Weak Passwords (OBJ 1.5).mp4 24.13Мб
6. Cracking Weak Passwords (OBJ 1.5).srt 5.53Кб
6. Cryptographic Use Cases (OBJ 1.7).mp4 135.50Мб
6. Cryptographic Use Cases (OBJ 1.7).srt 14.32Кб
6. Data Destruction (OBJ. 4.3).mp4 62.55Мб
6. Data Destruction (OBJ. 4.3).srt 6.91Кб
6. Data Encryption (OBJ 1.4).mp4 162.02Мб
6. Data Encryption (OBJ 1.4).srt 17.46Кб
6. DNS Protection (OBJ. 3.1).mp4 70.97Мб
6. DNS Protection (OBJ. 3.1).srt 6.84Кб
6. Extending Controls (OBJ 1.6).mp4 108.16Мб
6. Extending Controls (OBJ 1.6).srt 11.65Кб
6. Forensic Analysis Tools (OBJ. 2.9).mp4 172.71Мб
6. Forensic Analysis Tools (OBJ. 2.9).srt 19.64Кб
6. IPSec (OBJ. 3.6).mp4 317.12Мб
6. IPSec (OBJ. 3.6).srt 35.19Кб
6. Log Collection and Analysis (OBJ. 3.4).mp4 96.02Мб
6. Log Collection and Analysis (OBJ. 3.4).srt 10.61Кб
6. Logs (OBJ. 2.2).mp4 148.80Мб
6. Logs (OBJ. 2.2).srt 16.31Кб
6. Mandatory Access Controls (MAC) (OBJ. 3.2).mp4 142.55Мб
6. Mandatory Access Controls (MAC) (OBJ. 3.2).srt 15.03Кб
6. Network Segmentation (OBJ 1.1).mp4 284.51Мб
6. Network Segmentation (OBJ 1.1).srt 31.51Кб
6. Passwordless Authentication (OBJ 1.8).mp4 112.91Мб
6. Passwordless Authentication (OBJ 1.8).srt 12.48Кб
6. Playbooks (OBJ. 2.7).mp4 179.71Мб
6. Playbooks (OBJ. 2.7).srt 21.00Кб
6. Protocol Analysis (OBJ. 2.4).mp4 170.48Мб
6. Protocol Analysis (OBJ. 2.4).srt 18.79Кб
6. Risk Tracking (OBJ. 4.1).mp4 109.44Мб
6. Risk Tracking (OBJ. 4.1).srt 12.09Кб
6. Security Automation (OBJ. 2.6).mp4 230.05Мб
6. Security Automation (OBJ. 2.6).srt 25.06Кб
6. Security Controls (OBJ 4.1).mp4 200.07Мб
6. Security Controls (OBJ 4.1).srt 22.95Кб
6. Steganography.mp4 38.39Мб
6. Steganography.srt 8.42Кб
6. Stream Ciphers (OBJ. 3.6).mp4 96.46Мб
6. Stream Ciphers (OBJ. 3.6).srt 10.21Кб
6. Testing Plans (OBJ 4.4).mp4 155.59Мб
6. Testing Plans (OBJ 4.4).srt 18.96Кб
6. Threat Management Frameworks (OBJ. 2.1).mp4 234.63Мб
6. Threat Management Frameworks (OBJ. 2.1).srt 32.04Кб
6. Trust Models (OBJ. 3.5).mp4 96.22Мб
6. Trust Models (OBJ. 3.5).srt 11.53Кб
6. Viability and Support (OBJ 4.2).mp4 235.97Мб
6. Viability and Support (OBJ 4.2).srt 26.22Кб
6. Virtualization (OBJ 1.2).mp4 179.99Мб
6. Virtualization (OBJ 1.2).srt 19.13Кб
6. XML Injections (OBJ. 2.5).mp4 138.33Мб
6. XML Injections (OBJ. 2.5).srt 14.87Кб
60 1.07Мб
61 799.32Кб
62 1.16Мб
63 1.62Мб
64 1.94Мб
65 229.31Кб
66 767.25Кб
67 5.50Кб
68 295.45Кб
69 530.99Кб
7 908.68Кб
7. Best Practices (OBJ 1.3).mp4 132.39Мб
7. Best Practices (OBJ 1.3).srt 14.67Кб
7. Block Ciphers (OBJ. 3.6).mp4 211.33Мб
7. Block Ciphers (OBJ. 3.6).srt 23.78Кб
7. Certificate Management (OBJ. 3.5).mp4 59.42Мб
7. Certificate Management (OBJ. 3.5).srt 6.81Кб
7. Checkpoint Business Continuity.html 160б
7. Checkpoint Digital Forensics.html 160б
7. Checkpoint Incident Response.html 160б
7. Cloud Access Security Broker (CASB) (OBJ. 3.4).mp4 134.02Мб
7. Cloud Access Security Broker (CASB) (OBJ. 3.4).srt 15.05Кб
7. Data Loss Prevention (DLP) (OBJ 1.4).mp4 218.21Мб
7. Data Loss Prevention (DLP) (OBJ 1.4).srt 23.16Кб
7. Data Ownership (OBJ. 4.3).mp4 120.48Мб
7. Data Ownership (OBJ. 4.3).srt 13.60Кб
7. Dependencies (OBJ 4.2).mp4 102.31Мб
7. Dependencies (OBJ 4.2).srt 11.43Кб
7. Deployment Options (OBJ. 3.1).mp4 100.22Мб
7. Deployment Options (OBJ. 3.1).srt 9.99Кб
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).mp4 76.63Мб
7. Elliptic Curve Cryptography (ECC) (OBJ. 3.6).srt 7.18Кб
7. Homomorphic Encryption (OBJ 1.8).mp4 75.73Мб
7. Homomorphic Encryption (OBJ 1.8).srt 8.13Кб
7. Implement Network Segmentation (OBJ 1.1).mp4 54.46Мб
7. Implement Network Segmentation (OBJ 1.1).srt 21.71Кб
7. Improper Headers (OBJ. 2.5).mp4 127.27Мб
7. Improper Headers (OBJ. 2.5).srt 13.84Кб
7. IoC Notifications (OBJ. 2.2).mp4 162.59Мб
7. IoC Notifications (OBJ. 2.2).srt 19.53Кб
7. Legal Considerations (OBJ. 4.3).mp4 152.16Мб
7. Legal Considerations (OBJ. 4.3).srt 17.63Кб
7. Multifactor Authentication (OBJ 1.5).mp4 181.78Мб
7. Multifactor Authentication (OBJ 1.5).srt 19.63Кб
7. Other Injection Attacks (OBJ. 2.5).mp4 91.69Мб
7. Other Injection Attacks (OBJ. 2.5).srt 10.07Кб
7. Physical Security (OBJ. 2.6).mp4 253.90Мб
7. Physical Security (OBJ. 2.6).srt 25.06Кб
7. PKI Use Cases (OBJ 1.7).mp4 186.62Мб
7. PKI Use Cases (OBJ 1.7).srt 19.08Кб
7. Provision and Deprovision (OBJ 1.6).mp4 64.73Мб
7. Provision and Deprovision (OBJ 1.6).srt 7.07Кб
7. Proxies (OBJ 1.1).mp4 156.32Мб
7. Proxies (OBJ 1.1).srt 16.22Кб
7. Risk Assessment (OBJ. 4.1).mp4 390.82Мб
7. Risk Assessment (OBJ. 4.1).srt 45.12Кб
7. Secure Boot (OBJ. 3.2).mp4 124.88Мб
7. Secure Boot (OBJ. 3.2).srt 12.69Кб
7. Securing VMs (OBJ 1.2).mp4 36.66Мб
7. Securing VMs (OBJ 1.2).srt 9.69Кб
7. Security Solutions (OBJ 4.1).mp4 193.68Мб
7. Security Solutions (OBJ 4.1).srt 21.90Кб
7. TCPDump (OBJ. 2.4).mp4 75.74Мб
7. TCPDump (OBJ. 2.4).srt 17.42Кб
7. Using Aircrack-ng (OBJ. 2.9).mp4 84.56Мб
7. Using Aircrack-ng (OBJ. 2.9).srt 16.59Кб
7. Vulnerability Management Activities (OBJ. 2.3).mp4 254.06Мб
7. Vulnerability Management Activities (OBJ. 2.3).srt 29.45Кб
70 1.85Мб
71 68.39Кб
72 770.74Кб
73 1.25Мб
74 1.29Мб
75 1.66Мб
76 1.93Мб
77 346.75Кб
78 937.87Кб
79 1.52Мб
8 40.13Кб
8. Authentication Bypass (OBJ. 2.5).mp4 142.05Мб
8. Authentication Bypass (OBJ. 2.5).srt 16.35Кб
8. Authentication Protocols (OBJ 1.5).mp4 210.76Мб
8. Authentication Protocols (OBJ 1.5).srt 22.47Кб
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).mp4 82.53Мб
8. Certificate Validity (CRL and OCSP) (OBJ. 3.5).srt 9.39Кб
8. Checkpoint Cryptography.html 160б
8. Checkpoint Hashing and Symmetric Algorithms.html 160б
8. Cloud Misconfigurations (OBJ. 3.4).mp4 238.01Мб
8. Cloud Misconfigurations (OBJ. 3.4).srt 27.43Кб
8. Considerations (OBJ 4.2).mp4 232.51Мб
8. Considerations (OBJ 4.2).srt 26.57Кб
8. Containerization (OBJ 1.2).mp4 124.84Мб
8. Containerization (OBJ 1.2).srt 14.30Кб
8. Cost of a Data Breach (OBJ 4.1).mp4 132.51Мб
8. Cost of a Data Breach (OBJ 4.1).srt 13.54Кб
8. Data Sovereignty (OBJ. 4.3).mp4 71.12Мб
8. Data Sovereignty (OBJ. 4.3).srt 8.18Кб
8. DLP Detection (OBJ 1.4).mp4 142.62Мб
8. DLP Detection (OBJ 1.4).srt 15.55Кб
8. Forward Secrecy (OBJ. 3.6).mp4 73.95Мб
8. Forward Secrecy (OBJ. 3.6).srt 8.53Кб
8. Gateways (OBJ 1.1).mp4 99.85Мб
8. Gateways (OBJ 1.1).srt 10.58Кб
8. Hardware Encryption (OBJ. 3.2).mp4 103.23Мб
8. Hardware Encryption (OBJ. 3.2).srt 10.77Кб
8. Imaging Tools (OBJ. 2.9).mp4 168.60Мб
8. Imaging Tools (OBJ. 2.9).srt 16.82Кб
8. Integrating Applications (OBJ 1.3).mp4 99.06Мб
8. Integrating Applications (OBJ 1.3).srt 9.85Кб
8. Integrating Industries (OBJ. 4.3).mp4 74.33Мб
8. Integrating Industries (OBJ. 4.3).srt 8.54Кб
8. Lock Picking (OBJ. 2.6).mp4 36.67Мб
8. Lock Picking (OBJ. 2.6).srt 3.74Кб
8. Reconnaissance Concerns (OBJ. 3.1).mp4 175.93Мб
8. Reconnaissance Concerns (OBJ. 3.1).srt 18.84Кб
8. Response to IoCs (OBJ. 2.2).mp4 111.52Мб
8. Response to IoCs (OBJ. 2.2).srt 12.45Кб
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).mp4 154.93Мб
8. Security Content Automation Protocol (SCAP) (OBJ. 2.3).srt 16.21Кб
8. Server Segmentation (OBJ 1.1).mp4 229.82Мб
8. Server Segmentation (OBJ 1.1).srt 25.23Кб
8. Software Composition (OBJ. 2.5).mp4 207.96Мб
8. Software Composition (OBJ. 2.5).srt 23.47Кб
8. Storage Models (OBJ 1.6).mp4 114.62Мб
8. Storage Models (OBJ 1.6).srt 11.91Кб
8. VirtualAugmented Reality (OBJ 1.8).mp4 98.55Мб
8. VirtualAugmented Reality (OBJ 1.8).srt 11.15Кб
8. When Risk Management Fails (OBJ. 4.1).mp4 81.87Мб
8. When Risk Management Fails (OBJ. 4.1).srt 8.62Кб
8. Wireshark (OBJ. 2.4).mp4 88.41Мб
8. Wireshark (OBJ. 2.4).srt 20.41Кб
80 1.81Мб
81 1.40Мб
82 148.95Кб
83 1.00Мб
84 1.09Мб
85 1.22Мб
86 1.41Мб
87 1.98Мб
88 353.68Кб
89 615.09Кб
9 1.35Мб
9. 3D Printing (OBJ 1.8).mp4 66.76Мб
9. 3D Printing (OBJ 1.8).srt 7.30Кб
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).mp4 40.20Мб
9. Authenticated Encryption with Associated Data (AEAD) (OBJ. 3.6).srt 4.29Кб
9. Checkpoint Cloud Technologies.html 160б
9. Checkpoint Data Considerations.html 160б
9. Checkpoint Infrastructure Design.html 160б
9. Checkpoint Policies and Frameworks.html 160б
9. Checkpoint Risk Management.html 160б
9. Checkpoint Risk Reduction.html 160б
9. Checkpoint Risk Strategies.html 160б
9. Checkpoint Software Applications.html 160б
9. Checkpoint Threat and Vulnerability Management.html 160б
9. Collecting and Validating Evidence (OBJ. 2.9).mp4 103.24Мб
9. Collecting and Validating Evidence (OBJ. 2.9).srt 19.01Кб
9. Data Loss Detection (OBJ 1.4).mp4 247.50Мб
9. Data Loss Detection (OBJ 1.4).srt 28.05Кб
9. Endpoint Protections (OBJ. 3.2).mp4 213.38Мб
9. Endpoint Protections (OBJ. 3.2).srt 26.17Кб
9. Federation (OBJ 1.5).mp4 147.91Мб
9. Federation (OBJ 1.5).srt 16.16Кб
9. IDS and IPS (OBJ 1.1).mp4 139.29Мб
9. IDS and IPS (OBJ 1.1).srt 14.62Кб
9. Mobile Security (OBJ. 3.1).mp4 165.85Мб
9. Mobile Security (OBJ. 3.1).srt 18.14Кб
9. Nmap (OBJ. 2.4).mp4 83.97Мб
9. Nmap (OBJ. 2.4).srt 21.17Кб
9. Protecting Web Traffic (OBJ. 3.5).mp4 74.33Мб
9. Protecting Web Traffic (OBJ. 3.5).srt 8.15Кб
9. Security Appliances (OBJ. 2.2).mp4 134.61Мб
9. Security Appliances (OBJ. 2.2).srt 34.57Кб
9. Supply Chain (OBJ 4.2).mp4 130.89Мб
9. Supply Chain (OBJ 4.2).srt 16.00Кб
9. Virtualization (OBJ 1.6).mp4 172.07Мб
9. Virtualization (OBJ 1.6).srt 18.65Кб
9. Vulnerable Web Applications (OBJ. 2.5).mp4 253.91Мб
9. Vulnerable Web Applications (OBJ. 2.5).srt 27.00Кб
9. Web Application Vulnerabilities (OBJ. 2.5).mp4 53.44Мб
9. Web Application Vulnerabilities (OBJ. 2.5).srt 20.29Кб
9. Zero Trust (OBJ 1.1).mp4 144.80Мб
9. Zero Trust (OBJ 1.1).srt 15.80Кб
90 1.30Мб
91 1.68Мб
92 415.94Кб
93 1.07Мб
94 1.39Мб
95 1.46Мб
96 1.63Мб
97 423.26Кб
98 1.31Мб
99 1.84Мб
TutsNode.com.txt 63б
Статистика распространения по странам
США (US) 4
Великобритания (GB) 1
Болгария (BG) 1
Бангладеш (BD) 1
Польша (PL) 1
Германия (DE) 1
Всего 9
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент