Общая информация
Название Computer Security and Systems Management Specialization
Тип
Размер 2.39Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 107б
01_adding-users.en.srt 5.43Кб
01_adding-users.en.txt 3.21Кб
01_adding-users.mp4 7.94Мб
01_built-in-security-controls.en.srt 9.13Кб
01_built-in-security-controls.en.txt 5.55Кб
01_built-in-security-controls.mp4 40.21Мб
01_congratulations.en.srt 1.86Кб
01_congratulations.en.txt 1.17Кб
01_congratulations.mp4 9.17Мб
01 don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me en srt 8.04Кб
01 don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me en txt 4.89Кб
01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.mp4 39.08Мб
01_enterprise-install-of-centos.en.srt 4.92Кб
01_enterprise-install-of-centos.en.txt 3.07Кб
01_enterprise-install-of-centos.mp4 8.52Мб
01_introduction.en.srt 5.59Кб
01_introduction.en.srt 4.27Кб
01_introduction.en.txt 2.59Кб
01_introduction.en.txt 3.38Кб
01_introduction.mp4 21.99Мб
01_introduction.mp4 17.40Мб
01_linux-in-the-enterprise.en.srt 10.32Кб
01_linux-in-the-enterprise.en.txt 6.32Кб
01_linux-in-the-enterprise.mp4 44.04Мб
01_policies-part-1-organizational-policies.en.srt 9.46Кб
01_policies-part-1-organizational-policies.en.txt 5.77Кб
01_policies-part-1-organizational-policies.mp4 40.36Мб
01_security-at-the-forefront.en.srt 10.20Кб
01_security-at-the-forefront.en.txt 6.24Кб
01_security-at-the-forefront.mp4 41.89Мб
01_selinux.en.srt 9.01Кб
01_selinux.en.txt 5.33Кб
01_selinux.mp4 37.71Мб
01_strategies-for-monitoring.en.srt 8.48Кб
01_strategies-for-monitoring.en.txt 5.03Кб
01_strategies-for-monitoring.mp4 37.50Мб
01_updating-systems-in-the-enterprise.en.srt 7.98Кб
01_updating-systems-in-the-enterprise.en.txt 4.91Кб
01_updating-systems-in-the-enterprise.mp4 35.57Мб
01_welcome.en.srt 4.99Кб
01_welcome.en.txt 3.04Кб
01_welcome.mp4 24.38Мб
01_what-is-authorization.en.srt 7.71Кб
01_what-is-authorization.en.txt 4.70Кб
01_what-is-authorization.mp4 39.49Мб
01_what-is-virtualization.en.srt 7.34Кб
01_what-is-virtualization.en.txt 4.53Кб
01_what-is-virtualization.mp4 37.90Мб
01_why-do-we-need-to-learn-networking.en.srt 9.58Кб
01_why-do-we-need-to-learn-networking.en.txt 5.82Кб
01_why-do-we-need-to-learn-networking.mp4 46.40Мб
01_why-information-security-in-the-first-place.en.srt 7.55Кб
01_why-information-security-in-the-first-place.en.txt 4.74Кб
01_why-information-security-in-the-first-place.mp4 31.83Мб
01_windows-logon-process.en.srt 5.70Кб
01_windows-logon-process.en.txt 3.65Кб
01_windows-logon-process.mp4 9.02Мб
02_about-linux-and-distributions.en.srt 10.76Кб
02_about-linux-and-distributions.en.txt 6.29Кб
02_about-linux-and-distributions.mp4 46.82Мб
02_attack-surfaces.en.srt 9.27Кб
02_attack-surfaces.en.txt 5.58Кб
02_attack-surfaces.mp4 41.88Мб
02_rights-and-permissions.en.srt 7.16Кб
02_rights-and-permissions.en.txt 4.34Кб
02_rights-and-permissions.mp4 11.03Мб
02_splunk.en.srt 6.23Кб
02_splunk.en.txt 3.78Кб
02_splunk.mp4 9.27Мб
02_types-of-virtualization.en.srt 8.93Кб
02_types-of-virtualization.en.txt 5.55Кб
02_types-of-virtualization.mp4 38.41Мб
02_what-is-personal-computing.en.srt 6.79Кб
02_what-is-personal-computing.en.txt 4.21Кб
02_what-is-personal-computing.mp4 28.98Мб
02_when-something-goes-wrong.en.srt 8.49Кб
02_when-something-goes-wrong.en.txt 4.94Кб
02_when-something-goes-wrong.mp4 37.64Мб
02_windows-in-the-enterprise.en.srt 7.05Кб
02_windows-in-the-enterprise.en.txt 4.20Кб
02_windows-in-the-enterprise.mp4 29.93Мб
03_access-control.en.srt 6.04Кб
03_access-control.en.txt 3.62Кб
03_access-control.mp4 10.07Мб
03_baselining-and-assessment.en.srt 6.77Кб
03_baselining-and-assessment.en.txt 4.26Кб
03_baselining-and-assessment.mp4 31.98Мб
03_integrity.en.srt 7.40Кб
03_integrity.en.txt 4.32Кб
03_integrity.mp4 29.52Мб
03_linux-security.en.srt 13.32Кб
03_linux-security.en.txt 8.06Кб
03_linux-security.mp4 61.12Мб
03_networking-in-linux.en.srt 7.31Кб
03_networking-in-linux.en.txt 4.33Кб
03_networking-in-linux.mp4 11.34Мб
03_policies-part-2-technical-policies.en.srt 6.20Кб
03_policies-part-2-technical-policies.en.txt 3.82Кб
03_policies-part-2-technical-policies.mp4 29.33Мб
03_restricting-access-to-software-and-resources.en.srt 10.28Кб
03_restricting-access-to-software-and-resources.en.txt 6.22Кб
03_restricting-access-to-software-and-resources.mp4 18.78Мб
03_securing-users.en.srt 8.15Кб
03_securing-users.en.txt 4.74Кб
03_securing-users.mp4 14.74Мб
03_what-is-a-secure-computer.en.srt 5.22Кб
03_what-is-a-secure-computer.en.txt 3.24Кб
03_what-is-a-secure-computer.mp4 22.06Мб
03_what-is-enterprise-computing.en.srt 12.41Кб
03_what-is-enterprise-computing.en.txt 7.46Кб
03_what-is-enterprise-computing.mp4 52.12Мб
03_when-to-use-and-not-use-virtualization.en.srt 7.14Кб
03_when-to-use-and-not-use-virtualization.en.txt 4.20Кб
03_when-to-use-and-not-use-virtualization.mp4 33.38Мб
03_windows-server-install.en.srt 6.22Кб
03_windows-server-install.en.txt 3.83Кб
03_windows-server-install.mp4 8.02Мб
04_about-the-instructor.en.srt 10.78Кб
04_about-the-instructor.en.srt 10.56Кб
04_about-the-instructor.en.srt 10.56Кб
04_about-the-instructor.en.txt 6.24Кб
04_about-the-instructor.en.txt 6.23Кб
04_about-the-instructor.en.txt 6.19Кб
04_about-the-instructor.mp4 155.29Мб
04_about-the-instructor.mp4 155.29Мб
04_about-the-instructor.mp4 155.29Мб
04_active-directory.en.srt 16.42Кб
04_active-directory.en.txt 9.65Кб
04_active-directory.mp4 24.28Мб
04_auditing.en.srt 12.73Кб
04_auditing.en.txt 7.54Кб
04_auditing.mp4 21.66Мб
04_introduction.en.srt 5.73Кб
04_introduction.en.txt 3.71Кб
04_introduction.mp4 25.73Мб
04_managing-users-on-an-enterprise-level.en.srt 7.01Кб
04_managing-users-on-an-enterprise-level.en.txt 4.10Кб
04_managing-users-on-an-enterprise-level.mp4 11.25Мб
04_risk-in-system-management.en.srt 12.79Кб
04_risk-in-system-management.en.txt 7.74Кб
04_risk-in-system-management.mp4 53.73Мб
04_software-firewalls-in-linux.en.srt 8.98Кб
04_software-firewalls-in-linux.en.txt 5.02Кб
04_software-firewalls-in-linux.mp4 16.77Мб
04_what-roles-are-there-in-system-management.en.srt 6.35Кб
04_what-roles-are-there-in-system-management.en.txt 3.90Кб
04_what-roles-are-there-in-system-management.mp4 27.84Мб
04_your-computer-vs-an-enterprise-system.en.srt 7.92Кб
04_your-computer-vs-an-enterprise-system.en.txt 5.11Кб
04_your-computer-vs-an-enterprise-system.mp4 33.83Мб
05_about-the-instructor.en.srt 10.38Кб
05_about-the-instructor.en.txt 6.18Кб
05_about-the-instructor.mp4 155.29Мб
05_access-control.en.srt 8.97Кб
05_access-control.en.txt 5.35Кб
05_access-control.mp4 13.61Мб
05_confidentiality-integrity-and-availability.en.srt 9.70Кб
05_confidentiality-integrity-and-availability.en.txt 5.91Кб
05_confidentiality-integrity-and-availability.mp4 46.50Мб
05_group-policy.en.srt 8.30Кб
05_group-policy.en.txt 4.99Кб
05_group-policy.mp4 12.19Мб
05_networking-in-windows.en.srt 10.75Кб
05_networking-in-windows.en.txt 6.52Кб
05_networking-in-windows.mp4 15.06Мб
05_osi-model.en.srt 8.60Кб
05_osi-model.en.txt 5.22Кб
05_osi-model.mp4 36.71Мб
05_security-considerations-for-windows-systems.en.srt 8.96Кб
05_security-considerations-for-windows-systems.en.txt 5.37Кб
05_security-considerations-for-windows-systems.mp4 38.92Мб
05_separation-of-duties.en.srt 8.24Кб
05_separation-of-duties.en.txt 5.06Кб
05_separation-of-duties.mp4 36.81Мб
05_services-within-linux.en.srt 10.74Кб
05_services-within-linux.en.txt 6.03Кб
05_services-within-linux.mp4 16.18Мб
05_sudo.en.srt 6.87Кб
05_sudo.en.txt 4.06Кб
05_sudo.mp4 13.44Мб
05_what-is-going-to-prepare-me-for-practical-system-management.en.srt 8.07Кб
05_what-is-going-to-prepare-me-for-practical-system-management.en.txt 4.96Кб
05_what-is-going-to-prepare-me-for-practical-system-management.mp4 35.36Мб
06_planning-for-disaster.en.srt 10.08Кб
06_planning-for-disaster.en.txt 5.81Кб
06_planning-for-disaster.mp4 41.18Мб
06_ssh.en.srt 12.87Кб
06_ssh.en.txt 7.37Кб
06_ssh.mp4 24.59Мб
06_windows-and-encryption.en.srt 6.36Кб
06_windows-and-encryption.en.txt 3.92Кб
06_windows-and-encryption.mp4 9.65Мб
06_working-with-other-systems.en.srt 10.17Кб
06_working-with-other-systems.en.txt 6.08Кб
06_working-with-other-systems.mp4 44.73Мб
07_if-you-build-it-they-will-get-around-it.en.srt 10.41Кб
07_if-you-build-it-they-will-get-around-it.en.txt 6.11Кб
07_if-you-build-it-they-will-get-around-it.mp4 41.96Мб
07_syslog.en.srt 12.30Кб
07_syslog.en.txt 7.45Кб
07_syslog.mp4 21.09Мб
08_cron.en.srt 5.50Кб
08_cron.en.txt 3.35Кб
08_cron.mp4 7.21Мб
1 579б
10 272.71Кб
11 469.35Кб
12 44.67Кб
13 108.80Кб
14 118.92Кб
15 328.77Кб
16 139.19Кб
17 292.18Кб
18 8.84Кб
19 432.74Кб
2 28б
20 77.06Кб
21 90.57Кб
22 99.49Кб
23 297.23Кб
24 371.49Кб
25 1.26Кб
26 193.60Кб
27 294.92Кб
28 435.85Кб
29 143.91Кб
3 545б
30 173.74Кб
31 119.31Кб
32 16.17Кб
33 169.57Кб
34 72.40Кб
35 486.96Кб
36 177.10Кб
37 21.89Кб
38 163.18Кб
39 277.33Кб
4 344.16Кб
40 418.61Кб
41 125.18Кб
42 224.44Кб
43 450.45Кб
44 12.52Кб
45 346.06Кб
46 418.33Кб
47 228.22Кб
48 104.27Кб
49 233.10Кб
5 277.58Кб
50 332.38Кб
51 451.94Кб
52 263.15Кб
53 404.47Кб
54 57.76Кб
55 314.97Кб
56 162.53Кб
57 252.30Кб
58 479.28Кб
59 439.97Кб
6 390.99Кб
60 356.67Кб
61 236.22Кб
62 336.88Кб
63 487.86Кб
64 495.29Кб
65 487.09Кб
66 59.57Кб
7 182.96Кб
8 507.34Кб
9 100.47Кб
TutsNode.net.txt 63б
Статистика распространения по странам
Индия (IN) 3
Ботсвана (BW) 1
Всего 4
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент