Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
139б |
1 |
350.21Кб |
1. Attention for Ethical Hackers.html |
448б |
1. Basic Terminologies and Concepts.mp4 |
19.85Мб |
1. Basic Terminologies and Concepts.srt |
5.41Кб |
1. Characteristics of Cloud Computing.mp4 |
148.34Мб |
1. Characteristics of Cloud Computing.srt |
10.78Кб |
1. Command Parameters.mp4 |
15.56Мб |
1. Command Parameters.srt |
2.51Кб |
1. CompTIA A+ Certification Lab CompTIA A+ 220-1101, 220-1102.html |
266б |
1. CompTIA A+ Course Introduction.mp4 |
5.87Мб |
1. CompTIA A+ Course Introduction.srt |
1.55Кб |
1. CPU.mp4 |
47.85Мб |
1. CPU.srt |
3.47Кб |
1. Ethernet.mp4 |
12.51Мб |
1. Ethernet.srt |
2.42Кб |
1. Functions Of Operating Systems.mp4 |
168.61Мб |
1. Functions Of Operating Systems.srt |
14.40Кб |
1. History of Computer.mp4 |
29.18Мб |
1. History of Computer.srt |
1.85Кб |
1. Input Processing - Output Cycle.mp4 |
103.96Мб |
1. Input Processing - Output Cycle.srt |
8.45Кб |
1. Introduction to Users and Groups.mp4 |
8.02Мб |
1. Introduction to Users and Groups.srt |
3.41Кб |
1. Primary and Secondary Memory.mp4 |
69.64Мб |
1. Primary and Secondary Memory.srt |
4.84Кб |
1. Programming Languages.mp4 |
73.42Мб |
1. Programming Languages.srt |
6.88Кб |
1. Slow System Performance.mp4 |
8.56Мб |
1. Slow System Performance.srt |
2.43Кб |
1. Terminologies Part 1.mp4 |
46.26Мб |
1. Terminologies Part 1.srt |
6.93Кб |
1. Troubleshooting Methodology.mp4 |
13.48Мб |
1. Troubleshooting Methodology.srt |
4.18Кб |
1. View the File with more Command.mp4 |
20.12Мб |
1. View the File with more Command.srt |
2.19Кб |
1. What is a Library - 1.mp4 |
84.93Мб |
1. What is a Library - 1.srt |
5.17Кб |
1. What is database.mp4 |
13.25Мб |
1. What is database.srt |
3.91Кб |
1. What is IoT.mp4 |
62.32Мб |
1. What is IoT.srt |
4.46Кб |
1. What is Linux.mp4 |
5.51Мб |
1. What is Linux.srt |
1.80Кб |
1. What is Monitor.mp4 |
16.87Мб |
1. What is Monitor.srt |
4.23Кб |
1. What is Security.mp4 |
18.05Мб |
1. What is Security.srt |
2.93Кб |
10 |
672.30Кб |
10. Create File & Modify Date - touch Command.mp4 |
8.63Мб |
10. Create File & Modify Date - touch Command.srt |
1.18Кб |
10. iOS.mp4 |
5.37Мб |
10. iOS.srt |
1.57Кб |
10. Layer 2 ARP - Address Resolution Protocol.mp4 |
74.00Мб |
10. Layer 2 ARP - Address Resolution Protocol.srt |
7.70Кб |
10. MSTSC.mp4 |
9.01Мб |
10. MSTSC.srt |
1.68Кб |
10. What are DoS and DDoS Attacks.mp4 |
14.61Мб |
10. What are DoS and DDoS Attacks.srt |
3.59Кб |
100 |
450.87Кб |
101 |
588.42Кб |
102 |
687.82Кб |
103 |
804.83Кб |
104 |
954.60Кб |
105 |
1001.98Кб |
106 |
1019.19Кб |
107 |
37.38Кб |
108 |
227.68Кб |
109 |
250.32Кб |
11 |
627.28Кб |
11. Chrome OS.mp4 |
6.07Мб |
11. Chrome OS.srt |
1.33Кб |
11. Layer 2 Analysing ARP Packets.mp4 |
36.35Мб |
11. Layer 2 Analysing ARP Packets.srt |
3.86Кб |
11. Malware Types.mp4 |
8.35Мб |
11. Malware Types.srt |
2.19Кб |
11. Remove Files or Directories - rm Command.mp4 |
12.41Мб |
11. Remove Files or Directories - rm Command.srt |
2.45Кб |
110 |
401.28Кб |
111 |
533.50Кб |
112 |
595.57Кб |
113 |
598.18Кб |
114 |
617.59Кб |
115 |
680.62Кб |
116 |
718.39Кб |
117 |
801.01Кб |
118 |
862.87Кб |
119 |
105.26Кб |
12 |
40.81Кб |
12. Copy and Move Files or Directories - cp & mv Command.mp4 |
12.94Мб |
12. Copy and Move Files or Directories - cp & mv Command.srt |
2.07Кб |
12. Layer 2 VLANs (Virtual Local Area Networks).mp4 |
25.35Мб |
12. Layer 2 VLANs (Virtual Local Area Networks).srt |
4.89Кб |
120 |
182.23Кб |
121 |
404.17Кб |
122 |
535.32Кб |
123 |
651.21Кб |
124 |
765.12Кб |
125 |
787.18Кб |
126 |
971.25Кб |
127 |
59.33Кб |
128 |
203.42Кб |
129 |
205.81Кб |
13 |
35.21Кб |
13. Find Files and Directories - find Command.mp4 |
17.28Мб |
13. Find Files and Directories - find Command.srt |
3.06Кб |
13. Layer 2 WLANs (Wireless Local Area Networks).mp4 |
28.88Мб |
13. Layer 2 WLANs (Wireless Local Area Networks).srt |
8.14Кб |
130 |
500.86Кб |
131 |
602.62Кб |
132 |
738.66Кб |
133 |
987.06Кб |
134 |
997.67Кб |
135 |
182.31Кб |
136 |
187.66Кб |
137 |
294.40Кб |
138 |
307.60Кб |
139 |
380.64Кб |
14 |
289.30Кб |
14. Cut Parts of Lines - cut Command.mp4 |
24.65Мб |
14. Cut Parts of Lines - cut Command.srt |
2.24Кб |
14. Layer 3 - Network Layer.mp4 |
8.50Мб |
14. Layer 3 - Network Layer.srt |
1.96Кб |
140 |
782.25Кб |
141 |
803.90Кб |
142 |
171.60Кб |
143 |
401.33Кб |
144 |
615.65Кб |
145 |
729.85Кб |
146 |
807.83Кб |
147 |
837.52Кб |
148 |
965.94Кб |
149 |
239.03Кб |
15 |
1008.28Кб |
15. Change Ownership of a Given File - chown Command.mp4 |
9.44Мб |
15. Change Ownership of a Given File - chown Command.srt |
2.02Кб |
15. Layer 3 IP (Internet Protocol).mp4 |
11.24Мб |
15. Layer 3 IP (Internet Protocol).srt |
3.04Кб |
150 |
240.05Кб |
151 |
578.23Кб |
152 |
850.81Кб |
153 |
911.84Кб |
154 |
913.23Кб |
155 |
968.15Кб |
156 |
1015.96Кб |
157 |
16.43Кб |
158 |
139.18Кб |
159 |
225.74Кб |
16 |
75.76Кб |
16. Layer 3 IPv4 Addressing System.mp4 |
7.06Мб |
16. Layer 3 IPv4 Addressing System.srt |
2.20Кб |
160 |
381.43Кб |
161 |
445.57Кб |
162 |
458.83Кб |
163 |
514.22Кб |
164 |
669.83Кб |
165 |
860.23Кб |
166 |
1003.98Кб |
167 |
14.43Кб |
168 |
70.93Кб |
169 |
173.04Кб |
17 |
548.16Кб |
17. Layer 3 IPv4 Packet Header.mp4 |
14.30Мб |
17. Layer 3 IPv4 Packet Header.srt |
3.58Кб |
170 |
576.35Кб |
171 |
583.76Кб |
172 |
681.48Кб |
173 |
776.95Кб |
174 |
833.90Кб |
175 |
951.86Кб |
176 |
959.03Кб |
177 |
959.24Кб |
178 |
51.06Кб |
179 |
86.32Кб |
18 |
483.25Кб |
18. Layer 3 Subnetting - Classful Networks.mp4 |
9.11Мб |
18. Layer 3 Subnetting - Classful Networks.srt |
2.71Кб |
180 |
385.29Кб |
181 |
576.22Кб |
182 |
955.82Кб |
183 |
131.58Кб |
184 |
152.16Кб |
185 |
172.70Кб |
186 |
216.14Кб |
187 |
337.10Кб |
188 |
410.96Кб |
189 |
502.86Кб |
19 |
347.54Кб |
19. Layer 3 Subnetting Masks.mp4 |
16.10Мб |
19. Layer 3 Subnetting Masks.srt |
2.97Кб |
190 |
646.83Кб |
191 |
684.55Кб |
192 |
753.85Кб |
193 |
758.12Кб |
194 |
145.48Кб |
195 |
596.43Кб |
196 |
675.86Кб |
197 |
460.71Кб |
2 |
983.01Кб |
2. Common Symptoms of Malware Infections.mp4 |
14.76Мб |
2. Common Symptoms of Malware Infections.srt |
3.35Кб |
2. Computer Inputs.mp4 |
16.06Мб |
2. Computer Inputs.srt |
1.12Кб |
2. Content of the Network Fundamentals.mp4 |
11.82Мб |
2. Content of the Network Fundamentals.srt |
1.61Кб |
2. Distributions.mp4 |
6.62Мб |
2. Distributions.srt |
1.50Кб |
2. FAQ About CompTIA A+ Certification Lab CompTIA A+ 220-1101, 220-1102.html |
8.37Кб |
2. Fiber.mp4 |
10.61Мб |
2. Fiber.srt |
2.78Кб |
2. GPU.mp4 |
44.45Мб |
2. GPU.srt |
2.96Кб |
2. Kinds of Operating System.mp4 |
28.20Мб |
2. Kinds of Operating System.srt |
1.86Кб |
2. List Files - ls Command.mp4 |
36.79Мб |
2. List Files - ls Command.srt |
3.60Кб |
2. Managing Users and Groups.mp4 |
5.26Мб |
2. Managing Users and Groups.srt |
1.63Кб |
2. Privacy-Integrity-Availability.mp4 |
15.33Мб |
2. Privacy-Integrity-Availability.srt |
4.22Кб |
2. RAM.mp4 |
21.55Мб |
2. RAM.srt |
1.78Кб |
2. RDBMS(Relational Database Management System).mp4 |
10.18Мб |
2. RDBMS(Relational Database Management System).srt |
2.54Кб |
2. System Lockups.mp4 |
10.06Мб |
2. System Lockups.srt |
3.56Кб |
2. Terminologies Part 2.mp4 |
24.61Мб |
2. Terminologies Part 2.srt |
7.82Кб |
2. Types of Programming.mp4 |
151.32Мб |
2. Types of Programming.srt |
10.16Кб |
2. View the File with less Command.mp4 |
14.22Мб |
2. View the File with less Command.srt |
1.51Кб |
2. What is a Computer.mp4 |
23.43Мб |
2. What is a Computer.srt |
1.70Кб |
2. What is Cloud Computing.mp4 |
58.02Мб |
2. What is Cloud Computing.srt |
4.23Кб |
2. What is Printer.mp4 |
5.26Мб |
2. What is Printer.srt |
2.47Кб |
2. What is Virtualization.mp4 |
18.03Мб |
2. What is Virtualization.srt |
1.13Кб |
2. Where does IoT Exist in Our Lives.mp4 |
31.91Мб |
2. Where does IoT Exist in Our Lives.srt |
2.47Кб |
2. Wireless Operating Modes.mp4 |
39.78Мб |
2. Wireless Operating Modes.srt |
7.04Кб |
20 |
3.13Кб |
20. Layer 3 Understanding IPv4 Subnets.mp4 |
25.01Мб |
20. Layer 3 Understanding IPv4 Subnets.srt |
3.30Кб |
21 |
589.40Кб |
21. Layer 3 IPv4 Address Shortage.mp4 |
15.02Мб |
21. Layer 3 IPv4 Address Shortage.srt |
2.29Кб |
22 |
776.66Кб |
22. Layer 3 Private Networks.mp4 |
17.93Мб |
22. Layer 3 Private Networks.srt |
4.75Кб |
23 |
365.99Кб |
23. Layer 3 Private Networks - Demonstration.mp4 |
13.36Мб |
23. Layer 3 Private Networks - Demonstration.srt |
3.28Кб |
24 |
387.99Кб |
24. Layer 3 NAT (Network Address Translation).mp4 |
29.39Мб |
24. Layer 3 NAT (Network Address Translation).srt |
5.42Кб |
25 |
696.90Кб |
25. Layer 3 IPv6, Packet Header & Addressing.mp4 |
29.26Мб |
25. Layer 3 IPv6, Packet Header & Addressing.srt |
9.88Кб |
26 |
1005.38Кб |
26. Layer 3 DHCP - How the Mechanism Works.mp4 |
75.53Мб |
26. Layer 3 DHCP - How the Mechanism Works.srt |
10.99Кб |
27 |
48.87Кб |
27. Layer 3 ICMP (Internet Control Message Protocol).mp4 |
7.07Мб |
27. Layer 3 ICMP (Internet Control Message Protocol).srt |
2.47Кб |
28 |
397.37Кб |
28. Layer 3 Traceroute.mp4 |
88.72Мб |
28. Layer 3 Traceroute.srt |
11.03Кб |
29 |
732.31Кб |
29. Layer 4 - Transport Layer.mp4 |
10.21Мб |
29. Layer 4 - Transport Layer.srt |
3.35Кб |
3 |
700.63Кб |
3. 32-Bit vs. 64-Bit File Systems.mp4 |
18.78Мб |
3. 32-Bit vs. 64-Bit File Systems.srt |
3.72Кб |
3. Basic Terms of Networking.mp4 |
33.86Мб |
3. Basic Terms of Networking.srt |
6.57Кб |
3. Benefits of Using Computer.mp4 |
10.29Мб |
3. Benefits of Using Computer.srt |
922б |
3. Cloud Service Modules - 1.mp4 |
121.90Мб |
3. Cloud Service Modules - 1.srt |
8.70Кб |
3. Encryption and Access Control.mp4 |
13.05Мб |
3. Encryption and Access Control.srt |
3.49Кб |
3. How does IoT work.mp4 |
13.61Мб |
3. How does IoT work.srt |
1.09Кб |
3. macOS Boot Errors.mp4 |
7.99Мб |
3. macOS Boot Errors.srt |
2.37Кб |
3. Motherboard.mp4 |
20.85Мб |
3. Motherboard.srt |
1.43Кб |
3. NTFS Permissions.mp4 |
12.03Мб |
3. NTFS Permissions.srt |
2.01Кб |
3. Pieces of Linux.mp4 |
11.63Мб |
3. Pieces of Linux.srt |
3.35Кб |
3. Print First Lines with head Command.mp4 |
7.19Мб |
3. Print First Lines with head Command.srt |
1.32Кб |
3. Print Working Directory - pwd Command.mp4 |
5.79Мб |
3. Print Working Directory - pwd Command.srt |
936б |
3. Sending Fake Emails - Phishing.mp4 |
7.93Мб |
3. Sending Fake Emails - Phishing.srt |
1.54Кб |
3. SRAM and DRAM.mp4 |
23.62Мб |
3. SRAM and DRAM.srt |
1.47Кб |
3. Troubleshooting Internet Connections.mp4 |
18.27Мб |
3. Troubleshooting Internet Connections.srt |
4.58Кб |
3. Types of Virtualization.mp4 |
26.97Мб |
3. Types of Virtualization.srt |
1.90Кб |
3. VGA.mp4 |
16.41Мб |
3. VGA.srt |
2.21Кб |
3. What are Headphones.mp4 |
15.07Мб |
3. What are Headphones.srt |
3.65Кб |
3. What is Processing.mp4 |
21.68Мб |
3. What is Processing.srt |
1.49Кб |
3. What is SQLQuery.mp4 |
12.04Мб |
3. What is SQLQuery.srt |
3.19Кб |
3. What is the CompTIA A+.mp4 |
6.44Мб |
3. What is the CompTIA A+.srt |
1.63Кб |
3. Wireless Packet Types.mp4 |
13.82Мб |
3. Wireless Packet Types.srt |
6.42Кб |
30 |
156.49Кб |
30. Layer 4 TCP (Transmission Control Protocol).mp4 |
40.43Мб |
30. Layer 4 TCP (Transmission Control Protocol).srt |
8.51Кб |
31 |
759.50Кб |
31. Layer 4 TCP Header.mp4 |
9.05Мб |
31. Layer 4 TCP Header.srt |
2.94Кб |
32 |
721.15Кб |
32. Layer 4 UDP (User Datagram Protocol).mp4 |
17.18Мб |
32. Layer 4 UDP (User Datagram Protocol).srt |
4.69Кб |
33 |
562.92Кб |
33. Layer 5-7 - Application Layer.mp4 |
3.55Мб |
33. Layer 5-7 - Application Layer.srt |
1.16Кб |
34 |
582.85Кб |
34. Layer 7 DNS (Domain Name System).mp4 |
27.91Мб |
34. Layer 7 DNS (Domain Name System).srt |
6.98Кб |
35 |
912.00Кб |
35. Layer 7 HTTP (Hyper Text Transfer Protocol).mp4 |
15.43Мб |
35. Layer 7 HTTP (Hyper Text Transfer Protocol).srt |
3.69Кб |
36 |
648.32Кб |
36. Layer 7 HTTPS.mp4 |
7.06Мб |
36. Layer 7 HTTPS.srt |
2.28Кб |
37 |
905.89Кб |
37. GNS3 - Graphical Network Simulator.mp4 |
42.37Мб |
37. GNS3 - Graphical Network Simulator.srt |
4.05Кб |
38 |
436.74Кб |
38. GNS3 Setting Up the First Project.mp4 |
108.34Мб |
38. GNS3 Setting Up the First Project.srt |
9.86Кб |
39 |
578.95Кб |
39. GNS3 Tool Components.mp4 |
40.01Мб |
39. GNS3 Tool Components.srt |
3.58Кб |
4 |
497.99Кб |
4. A Rule (Authentication, Authorization and Accounting).mp4 |
15.21Мб |
4. A Rule (Authentication, Authorization and Accounting).srt |
5.29Кб |
4. Check the Wi-Fi Settings.mp4 |
5.83Мб |
4. Check the Wi-Fi Settings.srt |
1.41Кб |
4. Cloud Service Modules - 2.mp4 |
104.39Мб |
4. Cloud Service Modules - 2.srt |
7.56Кб |
4. Connection Standarts.mp4 |
149.51Мб |
4. Connection Standarts.srt |
12.05Кб |
4. Cyber Attacks to CPU.mp4 |
17.49Мб |
4. Cyber Attacks to CPU.srt |
1.09Кб |
4. FAT32.mp4 |
6.92Мб |
4. FAT32.srt |
1.69Кб |
4. File Explorer.mp4 |
8.86Мб |
4. File Explorer.srt |
1.76Кб |
4. Functions of Virtualization.mp4 |
15.00Мб |
4. Functions of Virtualization.srt |
1.22Кб |
4. HDMI.mp4 |
7.33Мб |
4. HDMI.srt |
2.02Кб |
4. How Can We Get CompTIA A+.mp4 |
7.83Мб |
4. How Can We Get CompTIA A+.srt |
2.13Кб |
4. Install MS SQL Server Express Edition 2019.mp4 |
42.12Мб |
4. Install MS SQL Server Express Edition 2019.srt |
5.23Кб |
4. Output Devices.mp4 |
11.70Мб |
4. Output Devices.srt |
711б |
4. Print Last Lines with tail Command.mp4 |
10.83Мб |
4. Print Last Lines with tail Command.srt |
1.61Кб |
4. Reference Models.mp4 |
1.66Мб |
4. Reference Models.srt |
489б |
4. ROM.mp4 |
20.12Мб |
4. ROM.srt |
1.45Кб |
4. Shell.mp4 |
14.34Мб |
4. Shell.srt |
2.32Кб |
4. Show Manuel - man Command.mp4 |
19.52Мб |
4. Show Manuel - man Command.srt |
2.50Кб |
4. Types of Computer.mp4 |
18.00Мб |
4. Types of Computer.srt |
1.38Кб |
4. Vishing - Voice Phishing.mp4 |
14.78Мб |
4. Vishing - Voice Phishing.srt |
4.94Кб |
4. What is Computer Speaker.mp4 |
5.85Мб |
4. What is Computer Speaker.srt |
2.07Кб |
4. Windows Boot Errors.mp4 |
12.80Мб |
4. Windows Boot Errors.srt |
2.94Кб |
4. Wireshark Analysing Packet Types.mp4 |
99.97Мб |
4. Wireshark Analysing Packet Types.srt |
6.67Кб |
40 |
1012.73Кб |
40. GNS3 Building the Network.mp4 |
115.61Мб |
40. GNS3 Building the Network.srt |
17.47Кб |
41 |
221.89Кб |
41. GNS3 Attaching VMware VMs (Including Kali) to the Network.mp4 |
49.28Мб |
41. GNS3 Attaching VMware VMs (Including Kali) to the Network.srt |
7.77Кб |
42 |
214.28Кб |
42. GNS3 Configuring Switch & Router (Cisco) and creating VLANs.mp4 |
50.61Мб |
42. GNS3 Configuring Switch & Router (Cisco) and creating VLANs.srt |
6.07Кб |
43 |
661.93Кб |
43. Active Network Devices Router, Switch, Hub.mp4 |
28.83Мб |
43. Active Network Devices Router, Switch, Hub.srt |
5.80Кб |
44 |
510.97Кб |
44. Wireless Access Point(WAP).mp4 |
17.16Мб |
44. Wireless Access Point(WAP).srt |
1.51Кб |
45 |
142.75Кб |
45. Summary of Network Fundamentals.mp4 |
5.33Мб |
45. Summary of Network Fundamentals.srt |
1.51Кб |
46 |
88.28Кб |
47 |
106.85Кб |
48 |
697.25Кб |
49 |
315.52Кб |
5 |
678.07Кб |
5. 10 Reasons Why You Should Get CompTIA A+ Certified.html |
4.84Кб |
5. Change Directory - cd Command.mp4 |
11.82Мб |
5. Change Directory - cd Command.srt |
2.64Кб |
5. DisplayPort.mp4 |
11.21Мб |
5. DisplayPort.srt |
2.02Кб |
5. FAT64.mp4 |
9.11Мб |
5. FAT64.srt |
2.76Кб |
5. Global Regular Expression Print - grep Command.mp4 |
23.82Мб |
5. Global Regular Expression Print - grep Command.srt |
3.52Кб |
5. Insert Data to Table.mp4 |
74.66Мб |
5. Insert Data to Table.srt |
12.49Кб |
5. IoT Security.mp4 |
117.31Мб |
5. IoT Security.srt |
10.05Кб |
5. Linux Boot Errors.mp4 |
16.92Мб |
5. Linux Boot Errors.srt |
2.58Кб |
5. Linux Signs $, #, %, ~.mp4 |
4.86Мб |
5. Linux Signs $, #, %, ~.srt |
1.16Кб |
5. MSCONFIG.mp4 |
13.23Мб |
5. MSCONFIG.srt |
2.40Кб |
5. PROM, EPROM, EEPROM.mp4 |
17.19Мб |
5. PROM, EPROM, EEPROM.srt |
1.13Кб |
5. Security of the Virtualization.mp4 |
43.11Мб |
5. Security of the Virtualization.srt |
3.23Кб |
5. TCPIP (Networking) Basics.mp4 |
71.24Мб |
5. TCPIP (Networking) Basics.srt |
17.65Кб |
5. What is a Hacker.mp4 |
25.06Мб |
5. What is a Hacker.srt |
8.69Кб |
5. What is Cloud Security.mp4 |
17.39Мб |
5. What is Cloud Security.srt |
4.44Кб |
5. What is Projector.mp4 |
7.24Мб |
5. What is Projector.srt |
1.58Кб |
5. What is Storing.mp4 |
14.42Мб |
5. What is Storing.srt |
980б |
5. Who Else Is Using the Internet.mp4 |
5.60Мб |
5. Who Else Is Using the Internet.srt |
1.73Кб |
5. Wireless Encryption Protocols WEP vs. WPA.mp4 |
17.85Мб |
5. Wireless Encryption Protocols WEP vs. WPA.srt |
4.07Кб |
50 |
623.04Кб |
51 |
755.34Кб |
52 |
841.43Кб |
53 |
127.34Кб |
54 |
170.81Кб |
55 |
821.13Кб |
56 |
90.07Кб |
57 |
759.70Кб |
58 |
33.13Кб |
59 |
386.05Кб |
6 |
563.51Кб |
6. BIOS Time and Setting Resets.mp4 |
12.28Мб |
6. BIOS Time and Setting Resets.srt |
3.42Кб |
6. Concatenate Files - cat Command.mp4 |
14.16Мб |
6. Concatenate Files - cat Command.srt |
2.23Кб |
6. DVI.mp4 |
7.44Мб |
6. DVI.srt |
1.50Кб |
6. How does cloud security work.mp4 |
14.48Мб |
6. How does cloud security work.srt |
3.84Кб |
6. Mobile Security Threats.mp4 |
138.45Мб |
6. Mobile Security Threats.srt |
11.54Кб |
6. OSI Reference Model vs. TCPIP Reference Model.mp4 |
14.42Мб |
6. OSI Reference Model vs. TCPIP Reference Model.srt |
2.84Кб |
6. Output.mp4 |
22.08Мб |
6. Output.srt |
1.78Кб |
6. Services (Services.msc).mp4 |
14.40Мб |
6. Services (Services.msc).srt |
1.67Кб |
6. Unix Name - uname Command.mp4 |
4.42Мб |
6. Unix Name - uname Command.srt |
1001б |
6. Update Data in A Table.mp4 |
43.43Мб |
6. Update Data in A Table.srt |
6.15Кб |
6. Virtualization Lab Exercise - 1.mp4 |
155.04Мб |
6. Virtualization Lab Exercise - 1.srt |
9.20Кб |
6. What is Attack What are the Stages.mp4 |
12.80Мб |
6. What is Attack What are the Stages.srt |
4.01Кб |
6. What is Flash Memory, Magnetic Storage Devices, Optical Storage Devices.mp4 |
35.50Мб |
6. What is Flash Memory, Magnetic Storage Devices, Optical Storage Devices.srt |
2.60Кб |
6. What is GPS.mp4 |
13.90Мб |
6. What is GPS.srt |
2.99Кб |
6. Windows.mp4 |
8.55Мб |
6. Windows.srt |
2.44Кб |
6. WPA 4-Way Handshake.mp4 |
26.62Мб |
6. WPA 4-Way Handshake.srt |
6.11Кб |
60 |
670.35Кб |
61 |
966.46Кб |
62 |
1008.77Кб |
63 |
354.05Кб |
64 |
403.81Кб |
65 |
184.16Кб |
66 |
391.97Кб |
67 |
578.97Кб |
68 |
860.10Кб |
69 |
940.13Кб |
7 |
98.76Кб |
7. Apple Macintosh OS.mp4 |
7.43Мб |
7. Apple Macintosh OS.srt |
1.81Кб |
7. Attempts to Boot to Incorrect Device.mp4 |
8.16Мб |
7. Attempts to Boot to Incorrect Device.srt |
3.03Кб |
7. Computer Components.mp4 |
45.30Мб |
7. Computer Components.srt |
3.20Кб |
7. Delete Data and AdventureWorks.mp4 |
54.95Мб |
7. Delete Data and AdventureWorks.srt |
7.03Кб |
7. Display Output - echo Command.mp4 |
9.77Мб |
7. Display Output - echo Command.srt |
1.58Кб |
7. Network attached storage.mp4 |
27.26Мб |
7. Network attached storage.srt |
1.98Кб |
7. Network Layers in Real World.mp4 |
88.02Мб |
7. Network Layers in Real World.srt |
9.45Кб |
7. Output Redirection.mp4 |
15.99Мб |
7. Output Redirection.srt |
2.57Кб |
7. Performance Monitor.mp4 |
8.98Мб |
7. Performance Monitor.srt |
2.35Кб |
7. SATA Cables.mp4 |
5.67Мб |
7. SATA Cables.srt |
1.60Кб |
7. Terms Asset, Threat, Vulnerability, Risk, Exploit.mp4 |
11.71Мб |
7. Terms Asset, Threat, Vulnerability, Risk, Exploit.srt |
3.52Кб |
7. Virtualization Lab Exercise - 2.mp4 |
227.27Мб |
7. Virtualization Lab Exercise - 2.srt |
16.48Кб |
7. What makes cloud security different.mp4 |
19.76Мб |
7. What makes cloud security different.srt |
3.97Кб |
7. Wireshark WEP and WPA.mp4 |
9.17Мб |
7. Wireshark WEP and WPA.srt |
1.12Кб |
70 |
332.63Кб |
71 |
462.74Кб |
72 |
153.02Кб |
73 |
386.29Кб |
74 |
896.54Кб |
75 |
902.11Кб |
76 |
155.84Кб |
77 |
246.22Кб |
78 |
492.17Кб |
79 |
222.56Кб |
8 |
705.16Кб |
8. Cloud Storage.mp4 |
20.62Мб |
8. Cloud Storage.srt |
1.57Кб |
8. Input Devices.mp4 |
41.57Мб |
8. Input Devices.srt |
2.83Кб |
8. Layer 2 - Data Link Layer.mp4 |
16.58Мб |
8. Layer 2 - Data Link Layer.srt |
4.52Кб |
8. Linux Systems.mp4 |
83.46Мб |
8. Linux Systems.srt |
5.75Кб |
8. Output Redirection Pipe “”.mp4 |
17.73Мб |
8. Output Redirection Pipe “”.srt |
2.57Кб |
8. Task Manager.mp4 |
23.16Мб |
8. Task Manager.srt |
3.57Кб |
8. USB.mp4 |
6.95Мб |
8. USB.srt |
2.69Кб |
8. What is a Library - 2.mp4 |
68.62Мб |
8. What is a Library - 2.srt |
4.61Кб |
8. What is a Zero-day Attack.mp4 |
31.90Мб |
8. What is a Zero-day Attack.srt |
4.79Кб |
8. Why is cloud security important.mp4 |
10.40Мб |
8. Why is cloud security important.srt |
760б |
80 |
752.10Кб |
81 |
969.22Кб |
82 |
990.36Кб |
83 |
1021.88Кб |
84 |
72.83Кб |
85 |
151.91Кб |
86 |
272.70Кб |
87 |
522.69Кб |
88 |
625.09Кб |
89 |
740.70Кб |
9 |
399.90Кб |
9. Android.mp4 |
4.34Мб |
9. Android.srt |
1.90Кб |
9. Cloud Security Benefits& Disadvantages.mp4 |
29.69Мб |
9. Cloud Security Benefits& Disadvantages.srt |
8.74Кб |
9. Disk Management.mp4 |
14.96Мб |
9. Disk Management.srt |
2.14Кб |
9. Layer 2 Ethernet - Principles, Frames & Headers.mp4 |
31.32Мб |
9. Layer 2 Ethernet - Principles, Frames & Headers.srt |
4.67Кб |
9. Make Directory - mkdir Command.mp4 |
8.78Мб |
9. Make Directory - mkdir Command.srt |
1.35Кб |
9. What are BotBotnet and Zombies.mp4 |
9.77Мб |
9. What are BotBotnet and Zombies.srt |
1.98Кб |
90 |
829.01Кб |
91 |
836.11Кб |
92 |
861.41Кб |
93 |
85.31Кб |
94 |
128.90Кб |
95 |
434.89Кб |
96 |
600.78Кб |
97 |
916.55Кб |
98 |
958.52Кб |
99 |
12.82Кб |
TutsNode.net.txt |
59б |