Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
671б |
1 |
1.06Мб |
1.1 giac-gsec2019.zip |
569.36Кб |
1. Overview.mp4 |
93.55Мб |
1. Overview.srt |
9.22Кб |
10 |
1.59Мб |
10. Defensible Network Architecture.mp4 |
385.69Мб |
10. Defensible Network Architecture.srt |
38.25Кб |
11 |
587.17Кб |
11. Endpoint Security.mp4 |
321.32Мб |
11. Endpoint Security.srt |
35.69Кб |
12 |
1.22Мб |
12. Enforcing Windows Security.mp4 |
265.94Мб |
12. Enforcing Windows Security.srt |
29.47Кб |
13 |
59.43Кб |
13. Incident Handling and Response.mp4 |
373.94Мб |
13. Incident Handling and Response.srt |
37.89Кб |
14 |
6.61Кб |
14. IT Risk Management.mp4 |
443.13Мб |
14. IT Risk Management.srt |
43.27Кб |
15 |
1.85Мб |
15. Linux Security Structure, Permissions, and Access.mp4 |
337.72Мб |
15. Linux Security Structure, Permissions, and Access.srt |
44.82Кб |
16 |
156.46Кб |
16. Linux Hardening and Securing.mp4 |
377.43Мб |
16. Linux Hardening and Securing.srt |
38.18Кб |
17 |
1.26Мб |
17. Linux Monitoring and Attack Detection.mp4 |
335.49Мб |
17. Linux Monitoring and Attack Detection.srt |
44.44Кб |
18 |
435.30Кб |
18. Linux Security Utilities.mp4 |
378.41Мб |
18. Linux Security Utilities.srt |
43.55Кб |
19 |
570.53Кб |
19. Log Management and SIEMs.mp4 |
351.57Мб |
19. Log Management and SIEMs.srt |
41.61Кб |
2 |
892.74Кб |
2. Access Control and Password Management.mp4 |
376.78Мб |
2. Access Control and Password Management.srt |
40.84Кб |
20 |
1.77Мб |
20. Common Attack Methods.mp4 |
369.99Мб |
20. Common Attack Methods.srt |
41.09Кб |
21 |
1.68Мб |
21. Mitigation Strategies.mp4 |
401.58Мб |
21. Mitigation Strategies.srt |
40.90Кб |
22 |
286.25Кб |
22. Network Device Security.mp4 |
349.44Мб |
22. Network Device Security.srt |
33.73Кб |
23 |
1.54Мб |
23. Network Security Devices.mp4 |
379.72Мб |
23. Network Security Devices.srt |
40.78Кб |
24 |
526.43Кб |
24. Networking and Protocols.mp4 |
366.15Мб |
24. Networking and Protocols.srt |
42.55Кб |
25 |
698.68Кб |
25. Securing Windows Network Services.mp4 |
356.74Мб |
25. Securing Windows Network Services.srt |
45.25Кб |
26 |
1.87Мб |
26. Security Policies.mp4 |
277.96Мб |
26. Security Policies.srt |
31.60Кб |
27 |
703.71Кб |
27. Virtualization and Cloud Security.mp4 |
454.84Мб |
27. Virtualization and Cloud Security.srt |
42.64Кб |
28 |
1021.66Кб |
28. Web Communication Vulnerabilities.mp4 |
308.13Мб |
28. Web Communication Vulnerabilities.srt |
36.27Кб |
29 |
44.63Кб |
29. Vulnerability Scanning and Penetration Testing.mp4 |
464.24Мб |
29. Vulnerability Scanning and Penetration Testing.srt |
46.38Кб |
3 |
61.16Кб |
3. Active Defense.mp4 |
346.23Мб |
3. Active Defense.srt |
37.14Кб |
30 |
65.52Кб |
30. Windows Access Controls.mp4 |
303.31Мб |
30. Windows Access Controls.srt |
40.32Кб |
31 |
1.19Мб |
31. Windows Updates.mp4 |
403.88Мб |
31. Windows Updates.srt |
49.49Кб |
32 |
659.28Кб |
32. Windows Auditing and Forensics.mp4 |
213.36Мб |
32. Windows Auditing and Forensics.srt |
25.94Кб |
33. Windows Security Infrastructure.mp4 |
336.46Мб |
33. Windows Security Infrastructure.srt |
38.74Кб |
34. Wireless Network Security.mp4 |
299.00Мб |
34. Wireless Network Security.srt |
32.78Кб |
4 |
39.67Кб |
4. Contingency Plans.mp4 |
441.94Мб |
4. Contingency Plans.srt |
46.80Кб |
5 |
125.38Кб |
5. Critical Controls.mp4 |
248.81Мб |
5. Critical Controls.srt |
26.22Кб |
6 |
431.05Кб |
6. Basic Cryptography.mp4 |
399.05Мб |
6. Basic Cryptography.srt |
44.54Кб |
7 |
974.09Кб |
7. Cryptography Algorithms and Deployment.mp4 |
338.32Мб |
7. Cryptography Algorithms and Deployment.srt |
46.16Кб |
8 |
316.12Кб |
8. Cryptography Application.mp4 |
423.96Мб |
8. Cryptography Application.srt |
50.84Кб |
9 |
283.05Кб |
9. Defense in Depth.mp4 |
359.85Мб |
9. Defense in Depth.srt |
35.95Кб |
TutsNode.org.txt |
63б |