搜索
Professional IT and Hacking In Practice Certified Ethical Hacking Udemy
磁力链接/BT种子名称
Professional IT and Hacking In Practice Certified Ethical Hacking Udemy
磁力链接/BT种子简介
种子哈希:
36d5c7ba53527738aa9a2915e9924aebe787d853
文件大小:
4.4G
已经下载:
67
次
下载速度:
极快
收录时间:
2021-05-08
最近下载:
2024-09-01
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:36D5C7BA53527738AA9A2915E9924AEBE787D853
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
为美好的世界献上祝福
krissy
정예나93 다리문신 광고대행사 원본 20gb
广山庆子
doks-088
商k包间
梅姐
真实偷窥
舞魅
姦尸
紧抓
tre-087
diana and max
音大生
17-2
the old man s01e05
逆鳞
fset-352
裸体走秀
裸体体操
mike stern
明星吃瓜
cm菊花
venu-481
酒店小情侣
blackedraw claire
barracuda
p 站
昏睡レ
某大手金融系企業会議室盗撮
文件列表
6. Operating Systems Security/15. EXERCISE Detecting rootkits.mp4
61.1 MB
3. Designing Secure Computer Networks/9. Network Address translation.mp4
55.2 MB
7. Access Control/8. KERBEROS.mp4
55.1 MB
3. Designing Secure Computer Networks/10. Network access control RADIUS.mp4
50.8 MB
6. Operating Systems Security/1. Operating systems security - introduction.mp4
50.4 MB
6. Operating Systems Security/10. EXERCISE Vulnerability attacks.mp4
49.9 MB
4. Network administration/9. Intrusion detection.mp4
48.6 MB
8. Windows Security/7. Encryption - key protection.mp4
48.6 MB
6. Operating Systems Security/13. EXERCISE Removing malware.mp4
48.1 MB
7. Access Control/10. EXERCISE Offline attacks.mp4
47.9 MB
1. IT Security Trends/17. Cyber War.mp4
47.6 MB
6. Operating Systems Security/9. Malware.mp4
47.0 MB
3. Designing Secure Computer Networks/7. Protocols and services IP SEC.mp4
45.9 MB
4. Network administration/6. How to use Wireshark.mp4
45.7 MB
7. Access Control/9. Identity Theft.mp4
45.0 MB
4. Network administration/2. Monitoring Transmitted Data - Basic informations.mp4
43.1 MB
8. Windows Security/4. Additional Security Features - ASLR and DEP.mp4
42.9 MB
6. Operating Systems Security/4. EXERCISE OS boundaries.mp4
41.0 MB
1. IT Security Trends/19. Objective #1 - Data security - Introduction.mp4
40.7 MB
4. Network administration/3. Intrusion detection systems.mp4
40.1 MB
6. Operating Systems Security/12. Demonstration Process Explorer.mp4
40.0 MB
4. Network administration/8. How to analyze telnet protocol.mp4
39.8 MB
7. Access Control/11. Using online cracking services.mp4
39.5 MB
2. Computer Network Security/16. OSI MODEL #6 - Presentation Layer.mp4
39.2 MB
8. Windows Security/8. Drive encryption.mp4
39.2 MB
5. Wireless Networks Security/7. Authentication methods.mp4
38.9 MB
5. Wireless Networks Security/14. Client Attacks Denial of service.mp4
38.3 MB
8. Windows Security/9. BitLocker.mp4
38.2 MB
2. Computer Network Security/6. EXERCISE Data Link Layer Attack.mp4
37.0 MB
4. Network administration/10. Scanning computers.mp4
37.0 MB
8. Windows Security/3. UAC configuration.mp4
36.8 MB
2. Computer Network Security/8. TCP Tunnelling over ICMP.mp4
36.7 MB
8. Windows Security/11. File and folder encryption - EFS.mp4
36.2 MB
5. Wireless Networks Security/12. Client Attacks Launching a rogue access point.mp4
35.2 MB
1. IT Security Trends/22. Integrity of data.mp4
33.7 MB
1. IT Security Trends/15. Online privacy.mp4
33.6 MB
8. Windows Security/2. User Account Control.mp4
33.6 MB
7. Access Control/4. Authentication protocols and services.mp4
33.4 MB
2. Computer Network Security/7. OSI MODEL #3 - Network layer.mp4
33.2 MB
1. IT Security Trends/20. Confidentiality of data.mp4
33.2 MB
5. Wireless Networks Security/9. 802.11I WPA.mp4
33.1 MB
5. Wireless Networks Security/8. 802.11 WEP.mp4
32.9 MB
7. Access Control/2. Authentication users.mp4
32.9 MB
2. Computer Network Security/5. Threats ARP Poisoning.mp4
32.8 MB
4. Network administration/7. Analyzing Captured data.mp4
32.5 MB
7. Access Control/6. LM Hash.mp4
32.2 MB
4. Network administration/5. Wireshark - Introduction to network analysis.mp4
32.1 MB
5. Wireless Networks Security/11. Threats of WIFI networks.mp4
32.0 MB
3. Designing Secure Computer Networks/6. DMZ demilitarized Zone.mp4
31.7 MB
6. Operating Systems Security/11. EXERCISE Identifying suspicious processes.mp4
31.4 MB
6. Operating Systems Security/3. Three core.mp4
31.2 MB
13. Application Security/6. Automated SQL Injection.mp4
30.9 MB
5. Wireless Networks Security/3. WIFI - working principles.mp4
30.8 MB
1. IT Security Trends/7. Myths #1 - you’ll never be hacked.mp4
30.6 MB
5. Wireless Networks Security/2. WIFI security solutions - introduction.mp4
30.6 MB
3. Designing Secure Computer Networks/2. Subnetting IPv4.mp4
30.5 MB
13. Application Security/7. Cross-site scripting - XSS.mp4
30.5 MB
2. Computer Network Security/2. OSI MODEL #1 - Physical layer.mp4
30.4 MB
6. Operating Systems Security/14. Rootkits.mp4
30.3 MB
13. Application Security/4. EXERCISE Analyze the application.mp4
30.1 MB
2. Computer Network Security/10. OSI MODEL #4 - Transport Layer.mp4
30.0 MB
4. Network administration/4. Why are firewalls and NDIS not enough.mp4
29.6 MB
1. IT Security Trends/6. Popular myths about IT security - origins.mp4
29.3 MB
2. Computer Network Security/4. Threats MAC spoofing.mp4
28.8 MB
3. Designing Secure Computer Networks/5. IPv6 address notation.mp4
28.6 MB
14. Application Security - Configuration and Management/8. EXERCISE Application control rules.mp4
28.5 MB
6. Operating Systems Security/5. Process isolation.mp4
28.2 MB
2. Computer Network Security/21. Modifying Transmitted Packets.mp4
28.1 MB
2. Computer Network Security/13. EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4
27.4 MB
1. IT Security Trends/2. IT Prehistory.mp4
27.1 MB
1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.mp4
27.0 MB
6. Operating Systems Security/6. Kernel Mode Code Signing.mp4
26.9 MB
13. Application Security/2. Attacks on applications.mp4
26.7 MB
15. Cryptography/2. History of ciphers.mp4
26.7 MB
13. Application Security/10. Unsafe applications.mp4
26.2 MB
1. IT Security Trends/3. Let’s look a few years back.mp4
24.8 MB
15. Cryptography/1. Introduction to cryptography.mp4
24.7 MB
1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.mp4
24.6 MB
5. Wireless Networks Security/13. Client Attacks Evil twin.mp4
23.9 MB
2. Computer Network Security/3. OSI MODEL #2 - Data link layer.mp4
23.9 MB
16. Public Key Infrastructure/6. Planning the PKI.mp4
23.6 MB
13. Application Security/5. Blind SQL Injection.mp4
23.6 MB
10. Risk Management/14. Manipulation tactics.mp4
23.2 MB
2. Computer Network Security/1. Network security - introduction.mp4
23.1 MB
1. IT Security Trends/14. Fake identity.mp4
22.8 MB
3. Designing Secure Computer Networks/8. IP SEC Phase 1.mp4
22.8 MB
1. IT Security Trends/4. Cyber crimes - an evolution not revolution.mp4
22.3 MB
13. Application Security/1. Introduction to Application Security.mp4
22.3 MB
6. Operating Systems Security/2. Security boundaries.mp4
22.2 MB
16. Public Key Infrastructure/5. EXERCISE Certificates.mp4
21.6 MB
1. IT Security Trends/1. Introduction to Current Cyber Threats.mp4
21.5 MB
10. Risk Management/18. Fraud tools #1.mp4
21.0 MB
12. Disaster Recovery/10. CONFICKER CASE STUDY.mp4
21.0 MB
16. Public Key Infrastructure/8. PKI Administration.mp4
20.6 MB
1. IT Security Trends/16. Analyzing sniffing software.mp4
20.4 MB
15. Cryptography/11. Asymmetric-key algorithms.mp4
20.0 MB
10. Risk Management/15. EXERCISE Social Engineering attacks.mp4
19.9 MB
2. Computer Network Security/18. EXERCISE Application Layer Attacks.mp4
19.9 MB
5. Wireless Networks Security/6. Ineffective solutions.mp4
19.9 MB
1. IT Security Trends/11. Trends in IT Security.mp4
19.6 MB
6. Operating Systems Security/7. Java Virtual Machine and code access security.mp4
19.5 MB
1. IT Security Trends/12. The birth of technology society.mp4
19.5 MB
5. Wireless Networks Security/5. Threats and risks.mp4
19.4 MB
8. Windows Security/10. BitLocker To Go Reader.mp4
19.3 MB
12. Disaster Recovery/8. Collecting and analysing evidence.mp4
19.2 MB
15. Cryptography/7. DES-X.mp4
19.1 MB
10. Risk Management/8. Introduction to risk assessment.mp4
19.0 MB
10. Risk Management/11. EXERCISE Risk Assessment.mp4
19.0 MB
7. Access Control/7. Cached Credentials.mp4
19.0 MB
14. Application Security - Configuration and Management/6. Blocking applications.mp4
18.9 MB
13. Application Security/3. SQL Injection.mp4
18.8 MB
6. Operating Systems Security/16. EXERCISE Security evaluation.mp4
18.7 MB
10. Risk Management/19. Fraud tools #2.mp4
18.6 MB
15. Cryptography/9. Block cipher modes.mp4
18.3 MB
3. Designing Secure Computer Networks/3. Subnetting IPv6.mp4
18.3 MB
10. Risk Management/2. Attack methods.mp4
18.1 MB
14. Application Security - Configuration and Management/2. Managing applications.mp4
18.0 MB
2. Computer Network Security/17. OSI MODEL #7 - Application Layer.mp4
17.7 MB
14. Application Security - Configuration and Management/9. Isolating applications.mp4
17.7 MB
2. Computer Network Security/11. Threats Enumerating Remote Computers.mp4
17.6 MB
15. Cryptography/6. Data encryption standard.mp4
17.3 MB
2. Computer Network Security/14. OSI MODEL #5 - Session Layer.mp4
17.2 MB
14. Application Security - Configuration and Management/4. MS Update.mp4
17.0 MB
16. Public Key Infrastructure/7. Certificate life cycle.mp4
17.0 MB
10. Risk Management/16. SE with KALI BackTrack.mp4
16.9 MB
11. Defence in Depth/3. DiD OS and LAN Layers.mp4
16.9 MB
15. Cryptography/16. Hybrid Schemes.mp4
16.8 MB
7. Access Control/3. How secure is your password.mp4
16.7 MB
10. Risk Management/4. Target scanning and enumeration techniques #1.mp4
16.6 MB
2. Computer Network Security/19. Backtrack Attack Demonstration.mp4
16.3 MB
9. Security Policies/6. Why are security solutions fallible.mp4
16.2 MB
15. Cryptography/15. Digital signature.mp4
16.2 MB
15. Cryptography/5. Block ciphers.mp4
16.1 MB
8. Windows Security/12. EXERCISE EFS.mp4
16.1 MB
11. Defence in Depth/6. Automated attack targeting a service.mp4
15.9 MB
15. Cryptography/3. Symmetric and asymmetric ciphers.mp4
15.8 MB
12. Disaster Recovery/2. How to reduce losses.mp4
15.6 MB
16. Public Key Infrastructure/2. Public key infrastructure.mp4
15.5 MB
11. Defence in Depth/2. How to use Defence in Depth model.mp4
15.4 MB
14. Application Security - Configuration and Management/7. Software restrictions policies.mp4
15.2 MB
16. Public Key Infrastructure/4. What will PKI allow you.mp4
15.2 MB
15. Cryptography/14. HASH functions.mp4
15.1 MB
2. Computer Network Security/20. Man-in-the-Middle and Denial of Service Attacks.mp4
14.9 MB
11. Defence in Depth/9. Introduction to Immutable laws of security - Law #1.mp4
14.7 MB
10. Risk Management/10. DREAD Exploitability.mp4
14.6 MB
11. Defence in Depth/19. Laws for administrators.mp4
14.5 MB
9. Security Policies/10. STRIDE Spoofing identity.mp4
14.5 MB
1. IT Security Trends/13. EXERCISE How much info can you gather.mp4
14.4 MB
2. Computer Network Security/22. Unencrypted protocols.mp4
14.3 MB
15. Cryptography/4. Symmetric-key algorithms.mp4
14.2 MB
11. Defence in Depth/7. Automated user-targeting attack.mp4
14.1 MB
9. Security Policies/8. Introduction to threat modelling and classification.mp4
13.9 MB
12. Disaster Recovery/6. Audit users and keep control accounts.mp4
13.9 MB
5. Wireless Networks Security/4. Other wireless technologies.mp4
13.8 MB
11. Defence in Depth/4. DiD Perimeter and Physical Access Layers.mp4
13.5 MB
9. Security Policies/11. STRIDE Tampering with Data.mp4
13.5 MB
2. Computer Network Security/12. EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4
13.5 MB
9. Security Policies/5. Security issues.mp4
13.5 MB
15. Cryptography/12. RSA.mp4
13.5 MB
15. Cryptography/8. Advanced encryption standards.mp4
13.5 MB
16. Public Key Infrastructure/3. Implementing public key infrastructure.mp4
13.4 MB
10. Risk Management/9. DREAD Risk assessment model.mp4
13.3 MB
9. Security Policies/7. Security policy issues.mp4
13.2 MB
12. Disaster Recovery/4. Threat discovery #1.mp4
12.9 MB
13. Application Security/9. Program security assessment.mp4
12.7 MB
10. Risk Management/13. Introduction to Social Engineering and rogue software.mp4
12.0 MB
3. Designing Secure Computer Networks/1. Designing Computer Networks - introduction.mp4
11.5 MB
9. Security Policies/2. What is security.mp4
11.4 MB
12. Disaster Recovery/3. Ensuring continous availability.mp4
11.3 MB
12. Disaster Recovery/9. Forensics example.mp4
11.1 MB
9. Security Policies/9. Threat modelling - STRIDE.mp4
11.1 MB
9. Security Policies/12. STRIDE Denial of Service.mp4
10.9 MB
9. Security Policies/3. Information security.mp4
10.8 MB
9. Security Policies/4. Information security - level up.mp4
10.3 MB
7. Access Control/1. Authentication and authorisation - Introduction.mp4
10.1 MB
11. Defence in Depth/17. Law #9.mp4
9.7 MB
5. Wireless Networks Security/15. EXERCISE WPA attack.mp4
9.3 MB
12. Disaster Recovery/5. Threat discovery #2.mp4
9.3 MB
11. Defence in Depth/13. Law #5.mp4
9.2 MB
15. Cryptography/10. Stream Ciphers - RC4.mp4
9.0 MB
10. Risk Management/5. Target scanning and enumeration techniques #2.mp4
8.8 MB
12. Disaster Recovery/7. High risk users.mp4
8.3 MB
10. Risk Management/3. Local attacks.mp4
8.3 MB
8. Windows Security/5. PatchGuard.mp4
8.2 MB
8. Windows Security/1. Windows Security - what you’ll learn.mp4
8.0 MB
11. Defence in Depth/10. Law #2.mp4
8.0 MB
10. Risk Management/17. Rogue Software.mp4
7.7 MB
10. Risk Management/6. Passive scanning.mp4
7.5 MB
11. Defence in Depth/5. DiD Demonstration.mp4
7.3 MB
5. Wireless Networks Security/1. Wireless Networks.mp4
7.3 MB
14. Application Security - Configuration and Management/5. System Center Configuration Manager.mp4
6.6 MB
14. Application Security - Configuration and Management/3. Software updates.mp4
6.5 MB
4. Network administration/1. Introduction to Monitoring Transmitted Data.mp4
6.5 MB
1. IT Security Trends/9. Myths #3 - IT security is always a priority.mp4
6.3 MB
16. Public Key Infrastructure/1. Introduction to cryptology.mp4
6.3 MB
11. Defence in Depth/12. Law #4.mp4
6.2 MB
9. Security Policies/1. Security policies – introduction.mp4
6.2 MB
11. Defence in Depth/11. Law #3.mp4
6.1 MB
11. Defence in Depth/14. Law #6.mp4
6.1 MB
15. Cryptography/13. ELGAMAL.mp4
5.1 MB
11. Defence in Depth/16. Law #8.mp4
4.8 MB
11. Defence in Depth/1. Introduction to Defence in Depth.mp4
4.8 MB
12. Disaster Recovery/1. Introduction to Disaster Recovery.mp4
4.6 MB
6. Operating Systems Security/8. OS Security Boundaries - notes for the examination.pdf
4.5 MB
10. Risk Management/1. Introduction to Risk Management.mp4
4.1 MB
14. Application Security - Configuration and Management/1. Here’s what you’ll learn in this module.mp4
3.3 MB
11. Defence in Depth/15. Law #7.mp4
3.0 MB
10. Risk Management/20.1 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
3.0 MB
7. Access Control/5. Authentication - notes for the examination.pdf
3.0 MB
15. Cryptography/17.1 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
2.6 MB
6. Operating Systems Security/17. Malware - notes for the examination.pdf
2.6 MB
12. Disaster Recovery/11.1 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
2.6 MB
2. Computer Network Security/9. Network Protocols - notes for the examination.pdf
2.3 MB
16. Public Key Infrastructure/10.1 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
2.3 MB
2. Computer Network Security/23. Application Protocols - notes for the examination.pdf
2.3 MB
7. Access Control/12. Identity Theft - notes for the examination.pdf
2.2 MB
1. IT Security Trends/18. Changing IT Security Trends - notes for the examination.pdf
2.1 MB
1. IT Security Trends/23. Data security - notes for the examination.pdf
2.1 MB
11. Defence in Depth/18. Law #10.mp4
2.1 MB
10. Risk Management/12.1 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
1.9 MB
4. Network administration/11. Monitoring transmitted data - notes for the examination.pdf
1.9 MB
5. Wireless Networks Security/16. Wi-Fi Security Threats - notes for the examination.pdf
1.8 MB
13. Application Security/8.1 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
1.7 MB
11. Defence in Depth/8.1 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
1.7 MB
11. Defence in Depth/20.1 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
1.7 MB
14. Application Security - Configuration and Management/10.1 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
1.7 MB
10. Risk Management/7.1 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
1.7 MB
8. Windows Security/13. Encryption - notes for the examination.pdf
1.7 MB
1. IT Security Trends/5. Current Cyber Threats - notes for the examination.pdf
1.5 MB
5. Wireless Networks Security/10. Standards and Security Solutions - notes for the examination.pdf
1.5 MB
8. Windows Security/6. Techniques and Methods - notes for the examination.pdf
1.5 MB
16. Public Key Infrastructure/9.1 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
1.5 MB
3. Designing Secure Computer Networks/4. Subnetting - notes for the examination.pdf
1.5 MB
3. Designing Secure Computer Networks/11. Protocols and Services - notes for the examination.pdf
1.3 MB
2. Computer Network Security/15. Transport Protocols - notes for the examination.pdf
1.2 MB
13. Application Security/11.1 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf
1.1 MB
1. IT Security Trends/10. Popular Myths About Computer System Security - notes for the examination.pdf
1.0 MB
18. Certificate/1. The Certificate - see how it looks like.pdf
494.0 kB
19. BONUS section - get your coupon code here/1. BONUS Examination - your voucher.pdf
95.6 kB
8. Windows Security/7. Encryption - key protection.vtt
14.4 kB
13. Application Security/4. EXERCISE Analyze the application.vtt
14.0 kB
6. Operating Systems Security/9. Malware.vtt
12.6 kB
13. Application Security/6. Automated SQL Injection.vtt
12.2 kB
3. Designing Secure Computer Networks/9. Network Address translation.vtt
12.2 kB
14. Application Security - Configuration and Management/8. EXERCISE Application control rules.vtt
12.0 kB
7. Access Control/10. EXERCISE Offline attacks.vtt
11.6 kB
8. Windows Security/4. Additional Security Features - ASLR and DEP.vtt
11.6 kB
15. Cryptography/2. History of ciphers.vtt
11.0 kB
7. Access Control/8. KERBEROS.vtt
11.0 kB
6. Operating Systems Security/15. EXERCISE Detecting rootkits.vtt
10.9 kB
3. Designing Secure Computer Networks/10. Network access control RADIUS.vtt
10.8 kB
13. Application Security/2. Attacks on applications.vtt
10.6 kB
13. Application Security/10. Unsafe applications.vtt
10.4 kB
15. Cryptography/1. Introduction to cryptography.vtt
10.2 kB
13. Application Security/7. Cross-site scripting - XSS.vtt
10.0 kB
13. Application Security/5. Blind SQL Injection.vtt
9.9 kB
3. Designing Secure Computer Networks/7. Protocols and services IP SEC.vtt
9.6 kB
7. Access Control/9. Identity Theft.vtt
9.4 kB
6. Operating Systems Security/10. EXERCISE Vulnerability attacks.vtt
9.4 kB
10. Risk Management/14. Manipulation tactics.vtt
9.4 kB
6. Operating Systems Security/1. Operating systems security - introduction.vtt
9.3 kB
16. Public Key Infrastructure/6. Planning the PKI.vtt
9.2 kB
5. Wireless Networks Security/14. Client Attacks Denial of service.vtt
9.2 kB
14. Application Security - Configuration and Management/2. Managing applications.vtt
9.2 kB
4. Network administration/6. How to use Wireshark.vtt
9.2 kB
16. Public Key Infrastructure/5. EXERCISE Certificates.vtt
9.1 kB
6. Operating Systems Security/12. Demonstration Process Explorer.vtt
9.0 kB
4. Network administration/2. Monitoring Transmitted Data - Basic informations.vtt
8.8 kB
5. Wireless Networks Security/7. Authentication methods.vtt
8.8 kB
7. Access Control/11. Using online cracking services.vtt
8.6 kB
6. Operating Systems Security/13. EXERCISE Removing malware.vtt
8.5 kB
8. Windows Security/8. Drive encryption.vtt
8.4 kB
13. Application Security/3. SQL Injection.vtt
8.3 kB
13. Application Security/1. Introduction to Application Security.vtt
8.2 kB
4. Network administration/3. Intrusion detection systems.vtt
8.1 kB
8. Windows Security/3. UAC configuration.vtt
8.0 kB
8. Windows Security/9. BitLocker.vtt
8.0 kB
4. Network administration/8. How to analyze telnet protocol.vtt
7.9 kB
1. IT Security Trends/17. Cyber War.vtt
7.9 kB
7. Access Control/4. Authentication protocols and services.vtt
7.9 kB
14. Application Security - Configuration and Management/6. Blocking applications.vtt
7.9 kB
4. Network administration/9. Intrusion detection.vtt
7.7 kB
15. Cryptography/11. Asymmetric-key algorithms.vtt
7.7 kB
16. Public Key Infrastructure/8. PKI Administration.vtt
7.7 kB
6. Operating Systems Security/3. Three core.vtt
7.5 kB
3. Designing Secure Computer Networks/8. IP SEC Phase 1.vtt
7.4 kB
4. Network administration/10. Scanning computers.vtt
7.4 kB
10. Risk Management/11. EXERCISE Risk Assessment.vtt
7.3 kB
8. Windows Security/11. File and folder encryption - EFS.vtt
7.3 kB
2. Computer Network Security/6. EXERCISE Data Link Layer Attack.vtt
7.2 kB
3. Designing Secure Computer Networks/2. Subnetting IPv4.vtt
7.1 kB
7. Access Control/2. Authentication users.vtt
7.1 kB
12. Disaster Recovery/10. CONFICKER CASE STUDY.vtt
7.0 kB
4. Network administration/5. Wireshark - Introduction to network analysis.vtt
7.0 kB
6. Operating Systems Security/11. EXERCISE Identifying suspicious processes.vtt
7.0 kB
6. Operating Systems Security/4. EXERCISE OS boundaries.vtt
7.0 kB
2. Computer Network Security/8. TCP Tunnelling over ICMP.vtt
7.0 kB
5. Wireless Networks Security/8. 802.11 WEP.vtt
6.9 kB
15. Cryptography/9. Block cipher modes.vtt
6.9 kB
5. Wireless Networks Security/12. Client Attacks Launching a rogue access point.vtt
6.9 kB
2. Computer Network Security/5. Threats ARP Poisoning.vtt
6.9 kB
15. Cryptography/7. DES-X.vtt
6.8 kB
14. Application Security - Configuration and Management/4. MS Update.vtt
6.8 kB
10. Risk Management/2. Attack methods.vtt
6.8 kB
16. Public Key Infrastructure/4. What will PKI allow you.vtt
6.8 kB
7. Access Control/6. LM Hash.vtt
6.7 kB
1. IT Security Trends/19. Objective #1 - Data security - Introduction.vtt
6.6 kB
10. Risk Management/16. SE with KALI BackTrack.vtt
6.6 kB
10. Risk Management/18. Fraud tools #1.vtt
6.5 kB
16. Public Key Infrastructure/2. Public key infrastructure.vtt
6.5 kB
6. Operating Systems Security/5. Process isolation.vtt
6.5 kB
16. Public Key Infrastructure/7. Certificate life cycle.vtt
6.5 kB
2. Computer Network Security/7. OSI MODEL #3 - Network layer.vtt
6.5 kB
15. Cryptography/6. Data encryption standard.vtt
6.5 kB
10. Risk Management/19. Fraud tools #2.vtt
6.5 kB
14. Application Security - Configuration and Management/9. Isolating applications.vtt
6.4 kB
10. Risk Management/8. Introduction to risk assessment.vtt
6.4 kB
11. Defence in Depth/3. DiD OS and LAN Layers.vtt
6.4 kB
1. IT Security Trends/22. Integrity of data.vtt
6.3 kB
15. Cryptography/16. Hybrid Schemes.vtt
6.3 kB
6. Operating Systems Security/6. Kernel Mode Code Signing.vtt
6.3 kB
12. Disaster Recovery/8. Collecting and analysing evidence.vtt
6.2 kB
3. Designing Secure Computer Networks/5. IPv6 address notation.vtt
6.2 kB
3. Designing Secure Computer Networks/6. DMZ demilitarized Zone.vtt
6.2 kB
1. IT Security Trends/7. Myths #1 - you’ll never be hacked.vtt
6.2 kB
10. Risk Management/15. EXERCISE Social Engineering attacks.vtt
6.2 kB
2. Computer Network Security/16. OSI MODEL #6 - Presentation Layer.vtt
6.1 kB
8. Windows Security/2. User Account Control.vtt
6.1 kB
14. Application Security - Configuration and Management/7. Software restrictions policies.vtt
6.1 kB
15. Cryptography/3. Symmetric and asymmetric ciphers.vtt
6.1 kB
11. Defence in Depth/19. Laws for administrators.vtt
6.1 kB
6. Operating Systems Security/14. Rootkits.vtt
6.0 kB
5. Wireless Networks Security/11. Threats of WIFI networks.vtt
6.0 kB
1. IT Security Trends/15. Online privacy.vtt
6.0 kB
19. BONUS section - get your coupon code here/2. BONUS LECTURE Learn more and get to know our other courses.html
6.0 kB
5. Wireless Networks Security/3. WIFI - working principles.vtt
6.0 kB
2. Computer Network Security/4. Threats MAC spoofing.vtt
6.0 kB
15. Cryptography/15. Digital signature.vtt
6.0 kB
6. Operating Systems Security/16. EXERCISE Security evaluation.vtt
5.9 kB
5. Wireless Networks Security/9. 802.11I WPA.vtt
5.9 kB
4. Network administration/7. Analyzing Captured data.vtt
5.9 kB
16. Public Key Infrastructure/3. Implementing public key infrastructure.vtt
5.9 kB
15. Cryptography/5. Block ciphers.vtt
5.8 kB
2. Computer Network Security/2. OSI MODEL #1 - Physical layer.vtt
5.8 kB
4. Network administration/4. Why are firewalls and NDIS not enough.vtt
5.8 kB
5. Wireless Networks Security/2. WIFI security solutions - introduction.vtt
5.8 kB
1. IT Security Trends/6. Popular myths about IT security - origins.vtt
5.8 kB
2. Computer Network Security/10. OSI MODEL #4 - Transport Layer.vtt
5.7 kB
2. Computer Network Security/1. Network security - introduction.vtt
5.7 kB
10. Risk Management/4. Target scanning and enumeration techniques #1.vtt
5.7 kB
1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.vtt
5.7 kB
13. Application Security/9. Program security assessment.vtt
5.5 kB
11. Defence in Depth/4. DiD Perimeter and Physical Access Layers.vtt
5.5 kB
11. Defence in Depth/2. How to use Defence in Depth model.vtt
5.5 kB
15. Cryptography/4. Symmetric-key algorithms.vtt
5.5 kB
1. IT Security Trends/1. Introduction to Current Cyber Threats.vtt
5.5 kB
8. Windows Security/12. EXERCISE EFS.vtt
5.5 kB
1. IT Security Trends/3. Let’s look a few years back.vtt
5.4 kB
15. Cryptography/14. HASH functions.vtt
5.4 kB
12. Disaster Recovery/2. How to reduce losses.vtt
5.4 kB
10. Risk Management/10. DREAD Exploitability.vtt
5.4 kB
9. Security Policies/6. Why are security solutions fallible.vtt
5.4 kB
1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.vtt
5.4 kB
2. Computer Network Security/12. EXERCISE Transport Layer Attack using METASPLOIT part 1.vtt
5.3 kB
2. Computer Network Security/18. EXERCISE Application Layer Attacks.vtt
5.3 kB
1. IT Security Trends/4. Cyber crimes - an evolution not revolution.vtt
5.2 kB
2. Computer Network Security/13. EXERCISE Transport Layer Attack using METASPLOIT part 2.vtt
5.2 kB
7. Access Control/3. How secure is your password.vtt
5.1 kB
9. Security Policies/8. Introduction to threat modelling and classification.vtt
5.1 kB
1. IT Security Trends/2. IT Prehistory.vtt
5.1 kB
15. Cryptography/12. RSA.vtt
5.1 kB
1. IT Security Trends/14. Fake identity.vtt
5.0 kB
1. IT Security Trends/20. Confidentiality of data.vtt
5.0 kB
9. Security Policies/10. STRIDE Spoofing identity.vtt
5.0 kB
15. Cryptography/8. Advanced encryption standards.vtt
4.9 kB
6. Operating Systems Security/2. Security boundaries.vtt
4.9 kB
2. Computer Network Security/3. OSI MODEL #2 - Data link layer.vtt
4.8 kB
11. Defence in Depth/6. Automated attack targeting a service.vtt
4.8 kB
5. Wireless Networks Security/13. Client Attacks Evil twin.vtt
4.7 kB
10. Risk Management/9. DREAD Risk assessment model.vtt
4.7 kB
11. Defence in Depth/9. Introduction to Immutable laws of security - Law #1.vtt
4.6 kB
5. Wireless Networks Security/5. Threats and risks.vtt
4.6 kB
12. Disaster Recovery/6. Audit users and keep control accounts.vtt
4.6 kB
2. Computer Network Security/21. Modifying Transmitted Packets.vtt
4.6 kB
9. Security Policies/7. Security policy issues.vtt
4.6 kB
8. Windows Security/10. BitLocker To Go Reader.vtt
4.6 kB
7. Access Control/7. Cached Credentials.vtt
4.6 kB
9. Security Policies/5. Security issues.vtt
4.5 kB
11. Defence in Depth/7. Automated user-targeting attack.vtt
4.5 kB
9. Security Policies/11. STRIDE Tampering with Data.vtt
4.5 kB
6. Operating Systems Security/7. Java Virtual Machine and code access security.vtt
4.4 kB
10. Risk Management/13. Introduction to Social Engineering and rogue software.vtt
4.2 kB
5. Wireless Networks Security/6. Ineffective solutions.vtt
4.2 kB
11. Defence in Depth/17. Law #9.vtt
4.2 kB
12. Disaster Recovery/4. Threat discovery #1.vtt
4.1 kB
12. Disaster Recovery/3. Ensuring continous availability.vtt
4.0 kB
9. Security Policies/12. STRIDE Denial of Service.vtt
3.8 kB
9. Security Policies/4. Information security - level up.vtt
3.8 kB
1. IT Security Trends/13. EXERCISE How much info can you gather.vtt
3.8 kB
1. IT Security Trends/11. Trends in IT Security.vtt
3.8 kB
2. Computer Network Security/17. OSI MODEL #7 - Application Layer.vtt
3.8 kB
9. Security Policies/9. Threat modelling - STRIDE.vtt
3.8 kB
9. Security Policies/3. Information security.vtt
3.7 kB
2. Computer Network Security/14. OSI MODEL #5 - Session Layer.vtt
3.7 kB
12. Disaster Recovery/9. Forensics example.vtt
3.7 kB
2. Computer Network Security/11. Threats Enumerating Remote Computers.vtt
3.7 kB
12. Disaster Recovery/5. Threat discovery #2.vtt
3.5 kB
9. Security Policies/2. What is security.vtt
3.5 kB
15. Cryptography/10. Stream Ciphers - RC4.vtt
3.5 kB
5. Wireless Networks Security/15. EXERCISE WPA attack.vtt
3.5 kB
2. Computer Network Security/19. Backtrack Attack Demonstration.vtt
3.4 kB
1. IT Security Trends/16. Analyzing sniffing software.vtt
3.4 kB
10. Risk Management/5. Target scanning and enumeration techniques #2.vtt
3.3 kB
12. Disaster Recovery/7. High risk users.vtt
3.3 kB
11. Defence in Depth/13. Law #5.vtt
3.2 kB
3. Designing Secure Computer Networks/3. Subnetting IPv6.vtt
3.2 kB
1. IT Security Trends/12. The birth of technology society.vtt
3.1 kB
5. Wireless Networks Security/4. Other wireless technologies.vtt
3.0 kB
10. Risk Management/3. Local attacks.vtt
3.0 kB
2. Computer Network Security/22. Unencrypted protocols.vtt
2.9 kB
11. Defence in Depth/10. Law #2.vtt
2.9 kB
14. Application Security - Configuration and Management/5. System Center Configuration Manager.vtt
2.9 kB
14. Application Security - Configuration and Management/3. Software updates.vtt
2.9 kB
2. Computer Network Security/20. Man-in-the-Middle and Denial of Service Attacks.vtt
2.7 kB
11. Defence in Depth/5. DiD Demonstration.vtt
2.6 kB
10. Risk Management/17. Rogue Software.vtt
2.4 kB
16. Public Key Infrastructure/1. Introduction to cryptology.vtt
2.4 kB
3. Designing Secure Computer Networks/1. Designing Computer Networks - introduction.vtt
2.3 kB
11. Defence in Depth/11. Law #3.vtt
2.2 kB
11. Defence in Depth/14. Law #6.vtt
2.2 kB
9. Security Policies/1. Security policies – introduction.vtt
1.9 kB
15. Cryptography/13. ELGAMAL.vtt
1.9 kB
10. Risk Management/6. Passive scanning.vtt
1.9 kB
7. Access Control/1. Authentication and authorisation - Introduction.vtt
1.8 kB
11. Defence in Depth/12. Law #4.vtt
1.8 kB
11. Defence in Depth/16. Law #8.vtt
1.6 kB
12. Disaster Recovery/1. Introduction to Disaster Recovery.vtt
1.5 kB
11. Defence in Depth/1. Introduction to Defence in Depth.vtt
1.5 kB
10. Risk Management/1. Introduction to Risk Management.vtt
1.5 kB
8. Windows Security/5. PatchGuard.vtt
1.4 kB
5. Wireless Networks Security/1. Wireless Networks.vtt
1.3 kB
8. Windows Security/1. Windows Security - what you’ll learn.vtt
1.2 kB
11. Defence in Depth/15. Law #7.vtt
1.2 kB
4. Network administration/1. Introduction to Monitoring Transmitted Data.vtt
1.2 kB
1. IT Security Trends/9. Myths #3 - IT security is always a priority.vtt
1.2 kB
14. Application Security - Configuration and Management/1. Here’s what you’ll learn in this module.vtt
1.1 kB
11. Defence in Depth/18. Law #10.vtt
716 Bytes
[TGx]Downloaded from torrentgalaxy.org.txt
524 Bytes
19. BONUS section - get your coupon code here/3. Thank you for joining this training.html
374 Bytes
13. Application Security/12. Check your knowledge and get ready for the exam.html
153 Bytes
17. Prepare for the examination/1. Answer sample questions which you can find during the examination.html
152 Bytes
11. Defence in Depth/8. The Defence in Depth Model - notes for the examination.html
10 Bytes
12. Disaster Recovery/11. How to reduce losses - notes for the examination.html
10 Bytes
13. Application Security/8. Application Attacks - notes for the examination.html
10 Bytes
11. Defence in Depth/20. Immutable Laws of Security - notes for the examination.html
10 Bytes
16. Public Key Infrastructure/10. Public Key Infrastructure - Trust but verify - notes for the examination.html
10 Bytes
16. Public Key Infrastructure/9. Threat Modelling and Classification - notes for the examination.html
10 Bytes
10. Risk Management/20. Social Engineering and Rogue Software - notes for the examination.html
10 Bytes
13. Application Security/11. Program Security Assessment - notes for the examination.html
10 Bytes
14. Application Security - Configuration and Management/10. How to protect users without interrupting their work - notes for the examination.html
10 Bytes
15. Cryptography/17. Symmetric and Asymmetric Ciphers - notes for the examination.html
10 Bytes
10. Risk Management/12. Risk Assessment - notes for the examination.html
10 Bytes
10. Risk Management/7. Attack Methodologies - notes for the examination.html
10 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>