搜索
[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
磁力链接/BT种子名称
[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
磁力链接/BT种子简介
种子哈希:
f9a76b3330f136f3d27ceaf9507ff46d71cd13dd
文件大小:
4.79G
已经下载:
580
次
下载速度:
极快
收录时间:
2021-03-22
最近下载:
2025-01-01
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:F9A76B3330F136F3D27CEAF9507FF46D71CD13DD
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
少女初夜
萝莉岛
最近搜索
豺狼的日子 e10
rbd+368
314
笹本+
蜜桃臀女友
crello
推特姨
高高瘦瘦
231104
绿头鱼
吃屎 喝尿
vedrfuhrerinnen
给b
3000 学生
阿朱啊
厨大
辉夜姬国内最强骚母狗
juq-776
the+island
哆啦a梦大雄与天空的理想城
乖乖女足交
kidnapped the chloe ayling story
466
口交舔菊
presunto innocente
+舐め
美艳小狗
supa-018
梦丝多位美模内部定制女女互玩
幼儿园
文件列表
01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.mp4
223.9 MB
23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.mp4
188.6 MB
11 Operating Systems Security/114 EXERCISE Detecting rootkits.mp4
61.1 MB
08 Designing Secure Computer Networks/070 Network Address translation.mp4
55.2 MB
12 Access Control/124 KERBEROS.mp4
55.1 MB
08 Designing Secure Computer Networks/071 Network access control RADIUS.mp4
50.8 MB
11 Operating Systems Security/100 Operating systems security - introduction.mp4
50.4 MB
11 Operating Systems Security/109 EXERCISE Vulnerability attacks.mp4
49.9 MB
09 Network administration/081 Intrusion detection.mp4
48.6 MB
13 Windows Security/135 Encryption - key protection.mp4
48.6 MB
11 Operating Systems Security/112 EXERCISE Removing malware.mp4
48.1 MB
12 Access Control/126 EXERCISE Offline attacks.mp4
47.9 MB
05 IT Security Trends/032 Cyber War.mp4
47.6 MB
11 Operating Systems Security/108 Malware.mp4
47.0 MB
08 Designing Secure Computer Networks/068 Protocols and services IP SEC.mp4
45.9 MB
09 Network administration/078 How to use Wireshark.mp4
45.7 MB
12 Access Control/125 Identity Theft.mp4
45.0 MB
09 Network administration/074 Monitoring Transmitted Data - Basic informations.mp4
43.1 MB
13 Windows Security/132 Additional Security Features - ASLR and DEP.mp4
42.9 MB
11 Operating Systems Security/103 EXERCISE OS boundaries.mp4
41.0 MB
06 Data Security/034 Objective 1 - Data security - Introduction.mp4
40.7 MB
09 Network administration/075 Intrusion detection systems.mp4
40.1 MB
11 Operating Systems Security/111 Demonstration Process Explorer.mp4
40.0 MB
09 Network administration/080 How to analyze telnet protocol.mp4
39.8 MB
12 Access Control/127 Using online cracking services.mp4
39.5 MB
07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.mp4
39.2 MB
13 Windows Security/136 Drive encryption.mp4
39.1 MB
10 Wireless Networks Security/090 Authentication methods.mp4
38.9 MB
10 Wireless Networks Security/097 Client Attacks Denial of service.mp4
38.3 MB
13 Windows Security/137 BitLocker.mp4
38.2 MB
07 Computer Network Security/044 EXERCISE Data Link Layer Attack.mp4
37.0 MB
09 Network administration/082 Scanning computers.mp4
37.0 MB
13 Windows Security/131 UAC configuration.mp4
36.8 MB
07 Computer Network Security/046 TCP Tunnelling over ICMP.mp4
36.7 MB
13 Windows Security/139 File and folder encryption - EFS.mp4
36.2 MB
10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.mp4
35.2 MB
06 Data Security/035 Integrity of data.mp4
33.7 MB
05 IT Security Trends/030 Online privacy.mp4
33.6 MB
13 Windows Security/130 User Account Control.mp4
33.6 MB
12 Access Control/120 Authentication protocols and services.mp4
33.4 MB
07 Computer Network Security/045 OSI MODEL 3 - Network layer.mp4
33.2 MB
06 Data Security/037 Confidentiality of data.mp4
33.2 MB
10 Wireless Networks Security/092 802.11I WPA.mp4
33.1 MB
10 Wireless Networks Security/091 802.11 WEP.mp4
32.9 MB
12 Access Control/118 Authentication users.mp4
32.9 MB
07 Computer Network Security/043 Threats ARP Poisoning.mp4
32.8 MB
09 Network administration/079 Analyzing Captured data.mp4
32.5 MB
12 Access Control/122 LM Hash.mp4
32.2 MB
09 Network administration/077 Wireshark - Introduction to network analysis.mp4
32.1 MB
10 Wireless Networks Security/094 Threats of WIFI networks.mp4
32.0 MB
08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.mp4
31.7 MB
11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.mp4
31.4 MB
11 Operating Systems Security/102 Three core.mp4
31.2 MB
02 Application Security/010 Automated SQL Injection.mp4
30.9 MB
10 Wireless Networks Security/086 WIFI - working principles.mp4
30.8 MB
04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.mp4
30.6 MB
10 Wireless Networks Security/085 WIFI security solutions - introduction.mp4
30.6 MB
08 Designing Secure Computer Networks/063 Subnetting IPv4.mp4
30.5 MB
02 Application Security/011 Cross-site scripting - XSS.mp4
30.5 MB
07 Computer Network Security/040 OSI MODEL 1 - Physical layer.mp4
30.4 MB
11 Operating Systems Security/113 Rootkits.mp4
30.3 MB
02 Application Security/008 EXERCISE Analyze the application.mp4
30.1 MB
07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.mp4
30.0 MB
09 Network administration/076 Why are firewalls and NDIS not enough.mp4
29.6 MB
04 Popular IT Security Myths/021 Popular myths about IT security - origins.mp4
29.3 MB
07 Computer Network Security/042 Threats MAC spoofing.mp4
28.8 MB
08 Designing Secure Computer Networks/066 IPv6 address notation.mp4
28.6 MB
18 Application Security - Configuration and Management/212 EXERCISE Application control rules.mp4
28.5 MB
11 Operating Systems Security/104 Process isolation.mp4
28.2 MB
07 Computer Network Security/059 Modifying Transmitted Packets.mp4
28.1 MB
07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4
27.4 MB
03 Introduction to Cyber Threats/017 IT Prehistory.mp4
27.1 MB
04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.mp4
27.0 MB
11 Operating Systems Security/105 Kernel Mode Code Signing.mp4
26.9 MB
02 Application Security/006 Attacks on applications.mp4
26.7 MB
19 Cryptography/216 History of ciphers.mp4
26.7 MB
02 Application Security/014 Unsafe applications.mp4
26.2 MB
03 Introduction to Cyber Threats/018 Lets look a few years back.mp4
24.8 MB
19 Cryptography/215 Introduction to cryptography.mp4
24.7 MB
06 Data Security/038 EXERCISE Finding confidential data with search engines.mp4
24.6 MB
10 Wireless Networks Security/096 Client Attacks Evil twin.mp4
23.9 MB
07 Computer Network Security/041 OSI MODEL 2 - Data link layer.mp4
23.9 MB
20 Public Key Infrastructure/237 Planning the PKI.mp4
23.6 MB
02 Application Security/009 Blind SQL Injection.mp4
23.6 MB
15 Risk Management/167 Manipulation tactics.mp4
23.2 MB
07 Computer Network Security/039 Network security - introduction.mp4
23.1 MB
05 IT Security Trends/029 Fake identity.mp4
22.8 MB
08 Designing Secure Computer Networks/069 IP SEC Phase 1.mp4
22.8 MB
03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.mp4
22.3 MB
02 Application Security/005 Introduction to Application Security.mp4
22.3 MB
11 Operating Systems Security/101 Security boundaries.mp4
22.2 MB
20 Public Key Infrastructure/236 EXERCISE Certificates.mp4
21.6 MB
03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.mp4
21.5 MB
15 Risk Management/171 Fraud tools 1.mp4
21.0 MB
17 Disaster Recovery/203 CONFICKER CASE STUDY.mp4
21.0 MB
20 Public Key Infrastructure/239 PKI Administration.mp4
20.6 MB
05 IT Security Trends/031 Analyzing sniffing software.mp4
20.4 MB
19 Cryptography/225 Asymmetric-key algorithms.mp4
20.0 MB
15 Risk Management/168 EXERCISE Social Engineering attacks.mp4
19.9 MB
07 Computer Network Security/056 EXERCISE Application Layer Attacks.mp4
19.9 MB
10 Wireless Networks Security/089 Ineffective solutions.mp4
19.9 MB
05 IT Security Trends/026 Trends in IT Security.mp4
19.6 MB
11 Operating Systems Security/106 Java Virtual Machine and code access security.mp4
19.5 MB
05 IT Security Trends/027 The birth of technology society.mp4
19.5 MB
10 Wireless Networks Security/088 Threats and risks.mp4
19.4 MB
13 Windows Security/138 BitLocker To Go Reader.mp4
19.3 MB
17 Disaster Recovery/201 Collecting and analysing evidence.mp4
19.2 MB
19 Cryptography/221 DES-X.mp4
19.1 MB
15 Risk Management/161 Introduction to risk assessment.mp4
19.0 MB
15 Risk Management/164 EXERCISE Risk Assessment.mp4
19.0 MB
12 Access Control/123 Cached Credentials.mp4
19.0 MB
18 Application Security - Configuration and Management/210 Blocking applications.mp4
18.9 MB
02 Application Security/007 SQL Injection.mp4
18.8 MB
11 Operating Systems Security/115 EXERCISE Security evaluation.mp4
18.7 MB
15 Risk Management/172 Fraud tools 2.mp4
18.6 MB
19 Cryptography/223 Block cipher modes.mp4
18.3 MB
08 Designing Secure Computer Networks/064 Subnetting IPv6.mp4
18.3 MB
15 Risk Management/155 Attack methods.mp4
18.1 MB
18 Application Security - Configuration and Management/206 Managing applications.mp4
18.0 MB
07 Computer Network Security/055 OSI MODEL 7 - Application Layer.mp4
17.7 MB
18 Application Security - Configuration and Management/213 Isolating applications.mp4
17.7 MB
07 Computer Network Security/049 Threats Enumerating Remote Computers.mp4
17.6 MB
19 Cryptography/220 Data encryption standard.mp4
17.3 MB
07 Computer Network Security/052 OSI MODEL 5 - Session Layer.mp4
17.2 MB
18 Application Security - Configuration and Management/208 MS Update.mp4
17.0 MB
20 Public Key Infrastructure/238 Certificate life cycle.mp4
17.0 MB
15 Risk Management/169 SE with KALI BackTrack.mp4
16.9 MB
16 Defence in Depth/176 DiD OS and LAN Layers.mp4
16.9 MB
19 Cryptography/230 Hybrid Schemes.mp4
16.8 MB
12 Access Control/119 How secure is your password.mp4
16.7 MB
15 Risk Management/157 Target scanning and enumeration techniques 1.mp4
16.6 MB
07 Computer Network Security/057 Backtrack Attack Demonstration.mp4
16.3 MB
14 Security Policies/147 Why are security solutions fallible.mp4
16.2 MB
19 Cryptography/229 Digital signature.mp4
16.2 MB
19 Cryptography/219 Block ciphers.mp4
16.1 MB
13 Windows Security/140 EXERCISE EFS.mp4
16.1 MB
16 Defence in Depth/179 Automated attack targeting a service.mp4
15.9 MB
19 Cryptography/217 Symmetric and asymmetric ciphers.mp4
15.8 MB
17 Disaster Recovery/195 How to reduce losses.mp4
15.6 MB
20 Public Key Infrastructure/233 Public key infrastructure.mp4
15.5 MB
16 Defence in Depth/175 How to use Defence in Depth model.mp4
15.4 MB
18 Application Security - Configuration and Management/211 Software restrictions policies.mp4
15.2 MB
20 Public Key Infrastructure/235 What will PKI allow you.mp4
15.2 MB
19 Cryptography/228 HASH functions.mp4
15.1 MB
07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.mp4
14.9 MB
16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.mp4
14.7 MB
15 Risk Management/163 DREAD Exploitability.mp4
14.6 MB
16 Defence in Depth/192 Laws for administrators.mp4
14.5 MB
14 Security Policies/151 STRIDE Spoofing identity.mp4
14.5 MB
05 IT Security Trends/028 EXERCISE How much info can you gather.mp4
14.4 MB
07 Computer Network Security/060 Unencrypted protocols.mp4
14.3 MB
19 Cryptography/218 Symmetric-key algorithms.mp4
14.2 MB
16 Defence in Depth/180 Automated user-targeting attack.mp4
14.1 MB
14 Security Policies/149 Introduction to threat modelling and classification.mp4
13.9 MB
17 Disaster Recovery/199 Audit users and keep control accounts.mp4
13.9 MB
10 Wireless Networks Security/087 Other wireless technologies.mp4
13.8 MB
16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.mp4
13.5 MB
14 Security Policies/152 STRIDE Tampering with Data.mp4
13.5 MB
07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4
13.5 MB
14 Security Policies/146 Security issues.mp4
13.5 MB
19 Cryptography/226 RSA.mp4
13.5 MB
19 Cryptography/222 Advanced encryption standards.mp4
13.5 MB
20 Public Key Infrastructure/234 Implementing public key infrastructure.mp4
13.4 MB
15 Risk Management/162 DREAD Risk assessment model.mp4
13.3 MB
14 Security Policies/148 Security policy issues.mp4
13.2 MB
17 Disaster Recovery/197 Threat discovery 1.mp4
12.9 MB
02 Application Security/013 Program security assessment.mp4
12.7 MB
15 Risk Management/166 Introduction to Social Engineering and rogue software.mp4
12.0 MB
08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.mp4
11.5 MB
14 Security Policies/143 What is security.mp4
11.4 MB
17 Disaster Recovery/196 Ensuring continous availability.mp4
11.3 MB
17 Disaster Recovery/202 Forensics example.mp4
11.1 MB
14 Security Policies/150 Threat modelling - STRIDE.mp4
11.1 MB
14 Security Policies/153 STRIDE Denial of Service.mp4
10.9 MB
14 Security Policies/144 Information security.mp4
10.8 MB
14 Security Policies/145 Information security - level up.mp4
10.3 MB
12 Access Control/117 Authentication and authorisation - Introduction.mp4
10.1 MB
16 Defence in Depth/190 Law 9.mp4
9.7 MB
10 Wireless Networks Security/098 EXERCISE WPA attack.mp4
9.3 MB
17 Disaster Recovery/198 Threat discovery 2.mp4
9.3 MB
16 Defence in Depth/186 Law 5.mp4
9.2 MB
19 Cryptography/224 Stream Ciphers - RC4.mp4
9.0 MB
15 Risk Management/158 Target scanning and enumeration techniques 2.mp4
8.8 MB
17 Disaster Recovery/200 High risk users.mp4
8.3 MB
15 Risk Management/156 Local attacks.mp4
8.3 MB
13 Windows Security/133 PatchGuard.mp4
8.2 MB
13 Windows Security/129 Windows Security - what youll learn.mp4
8.0 MB
16 Defence in Depth/183 Law 2.mp4
8.0 MB
15 Risk Management/170 Rogue Software.mp4
7.7 MB
15 Risk Management/159 Passive scanning.mp4
7.5 MB
16 Defence in Depth/178 DiD Demonstration.mp4
7.3 MB
10 Wireless Networks Security/084 Wireless Networks.mp4
7.3 MB
18 Application Security - Configuration and Management/209 System Center Configuration Manager.mp4
6.6 MB
18 Application Security - Configuration and Management/207 Software updates.mp4
6.5 MB
09 Network administration/073 Introduction to Monitoring Transmitted Data.mp4
6.5 MB
04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.mp4
6.3 MB
20 Public Key Infrastructure/232 Introduction to cryptology.mp4
6.3 MB
16 Defence in Depth/185 Law 4.mp4
6.2 MB
14 Security Policies/142 Security policies introduction.mp4
6.2 MB
16 Defence in Depth/184 Law 3.mp4
6.1 MB
16 Defence in Depth/187 Law 6.mp4
6.1 MB
19 Cryptography/227 ELGAMAL.mp4
5.1 MB
16 Defence in Depth/189 Law 8.mp4
4.8 MB
16 Defence in Depth/174 Introduction to Defence in Depth.mp4
4.8 MB
17 Disaster Recovery/194 Introduction to Disaster Recovery.mp4
4.6 MB
11 Operating Systems Security/107 10-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
4.5 MB
15 Risk Management/154 Introduction to Risk Management.mp4
4.1 MB
18 Application Security - Configuration and Management/205 Heres what youll learn in this module.mp4
3.3 MB
16 Defence in Depth/188 Law 7.mp4
3.0 MB
15 Risk Management/173 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
3.0 MB
12 Access Control/121 11-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
3.0 MB
19 Cryptography/231 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.6 MB
11 Operating Systems Security/116 10-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.6 MB
17 Disaster Recovery/204 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.6 MB
07 Computer Network Security/047 06-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.3 MB
20 Public Key Infrastructure/241 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.3 MB
07 Computer Network Security/061 06-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.3 MB
12 Access Control/128 11-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.2 MB
05 IT Security Trends/033 01-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.1 MB
06 Data Security/036 01-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.1 MB
16 Defence in Depth/191 Law 10.mp4
2.1 MB
15 Risk Management/165 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.9 MB
09 Network administration/083 08-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.9 MB
10 Wireless Networks Security/099 09-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.8 MB
02 Application Security/012 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
16 Defence in Depth/181 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
16 Defence in Depth/193 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
18 Application Security - Configuration and Management/214 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
15 Risk Management/160 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
13 Windows Security/141 12-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
03 Introduction to Cyber Threats/020 01-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
10 Wireless Networks Security/093 09-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
13 Windows Security/134 12-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
20 Public Key Infrastructure/240 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
08 Designing Secure Computer Networks/065 07-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
08 Designing Secure Computer Networks/072 07-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.3 MB
07 Computer Network Security/053 06-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.2 MB
02 Application Security/015 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.1 MB
04 Popular IT Security Myths/025 01-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.0 MB
22 Certificate/242 Certificate-Itsec.pdf
494.0 kB
24 BONUS Section/244 Secacademy-Voucher.pdf
95.6 kB
01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.it.srt
27.7 kB
01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.en.srt
25.7 kB
23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.it.srt
18.1 kB
13 Windows Security/135 Encryption - key protection.it.srt
17.9 kB
02 Application Security/008 EXERCISE Analyze the application.it.srt
17.1 kB
23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.en.srt
16.8 kB
13 Windows Security/135 Encryption - key protection.en.srt
16.5 kB
02 Application Security/008 EXERCISE Analyze the application.en.srt
16.1 kB
11 Operating Systems Security/108 Malware.it.srt
15.5 kB
02 Application Security/010 Automated SQL Injection.it.srt
15.3 kB
18 Application Security - Configuration and Management/212 EXERCISE Application control rules.it.srt
15.2 kB
08 Designing Secure Computer Networks/070 Network Address translation.it.srt
14.6 kB
11 Operating Systems Security/108 Malware.en.srt
14.4 kB
13 Windows Security/132 Additional Security Features - ASLR and DEP.it.srt
14.2 kB
12 Access Control/126 EXERCISE Offline attacks.it.srt
14.1 kB
02 Application Security/010 Automated SQL Injection.en.srt
14.0 kB
08 Designing Secure Computer Networks/070 Network Address translation.en.srt
13.8 kB
18 Application Security - Configuration and Management/212 EXERCISE Application control rules.en.srt
13.7 kB
12 Access Control/124 KERBEROS.it.srt
13.6 kB
11 Operating Systems Security/114 EXERCISE Detecting rootkits.it.srt
13.5 kB
19 Cryptography/216 History of ciphers.it.srt
13.4 kB
12 Access Control/126 EXERCISE Offline attacks.en.srt
13.2 kB
13 Windows Security/132 Additional Security Features - ASLR and DEP.en.srt
13.2 kB
02 Application Security/006 Attacks on applications.it.srt
13.1 kB
08 Designing Secure Computer Networks/071 Network access control RADIUS.it.srt
13.0 kB
02 Application Security/014 Unsafe applications.it.srt
12.9 kB
19 Cryptography/215 Introduction to cryptography.it.srt
12.7 kB
19 Cryptography/216 History of ciphers.en.srt
12.5 kB
02 Application Security/011 Cross-site scripting - XSS.it.srt
12.5 kB
12 Access Control/124 KERBEROS.en.srt
12.5 kB
02 Application Security/009 Blind SQL Injection.it.srt
12.4 kB
11 Operating Systems Security/114 EXERCISE Detecting rootkits.en.srt
12.4 kB
08 Designing Secure Computer Networks/071 Network access control RADIUS.en.srt
12.3 kB
02 Application Security/006 Attacks on applications.en.srt
12.0 kB
02 Application Security/014 Unsafe applications.en.srt
11.9 kB
08 Designing Secure Computer Networks/068 Protocols and services IP SEC.it.srt
11.7 kB
12 Access Control/125 Identity Theft.it.srt
11.6 kB
19 Cryptography/215 Introduction to cryptography.en.srt
11.6 kB
11 Operating Systems Security/109 EXERCISE Vulnerability attacks.it.srt
11.6 kB
18 Application Security - Configuration and Management/206 Managing applications.it.srt
11.4 kB
10 Wireless Networks Security/097 Client Attacks Denial of service.it.srt
11.4 kB
02 Application Security/011 Cross-site scripting - XSS.en.srt
11.4 kB
02 Application Security/009 Blind SQL Injection.en.srt
11.3 kB
11 Operating Systems Security/100 Operating systems security - introduction.it.srt
11.3 kB
09 Network administration/078 How to use Wireshark.it.srt
11.3 kB
15 Risk Management/167 Manipulation tactics.it.srt
11.1 kB
20 Public Key Infrastructure/237 Planning the PKI.it.srt
11.1 kB
11 Operating Systems Security/111 Demonstration Process Explorer.it.srt
11.0 kB
20 Public Key Infrastructure/236 EXERCISE Certificates.it.srt
11.0 kB
08 Designing Secure Computer Networks/068 Protocols and services IP SEC.en.srt
10.8 kB
09 Network administration/074 Monitoring Transmitted Data - Basic informations.it.srt
10.8 kB
12 Access Control/125 Identity Theft.en.srt
10.7 kB
11 Operating Systems Security/109 EXERCISE Vulnerability attacks.en.srt
10.7 kB
15 Risk Management/167 Manipulation tactics.en.srt
10.7 kB
10 Wireless Networks Security/090 Authentication methods.it.srt
10.7 kB
11 Operating Systems Security/112 EXERCISE Removing malware.it.srt
10.6 kB
10 Wireless Networks Security/097 Client Attacks Denial of service.en.srt
10.6 kB
11 Operating Systems Security/100 Operating systems security - introduction.en.srt
10.5 kB
12 Access Control/127 Using online cracking services.it.srt
10.5 kB
20 Public Key Infrastructure/237 Planning the PKI.en.srt
10.5 kB
18 Application Security - Configuration and Management/206 Managing applications.en.srt
10.5 kB
09 Network administration/078 How to use Wireshark.en.srt
10.4 kB
20 Public Key Infrastructure/236 EXERCISE Certificates.en.srt
10.4 kB
02 Application Security/007 SQL Injection.it.srt
10.2 kB
11 Operating Systems Security/111 Demonstration Process Explorer.en.srt
10.1 kB
13 Windows Security/136 Drive encryption.it.srt
10.1 kB
02 Application Security/005 Introduction to Application Security.it.srt
10.1 kB
10 Wireless Networks Security/090 Authentication methods.en.srt
10.0 kB
09 Network administration/074 Monitoring Transmitted Data - Basic informations.en.srt
10.0 kB
09 Network administration/075 Intrusion detection systems.it.srt
9.9 kB
13 Windows Security/131 UAC configuration.it.srt
9.9 kB
18 Application Security - Configuration and Management/210 Blocking applications.it.srt
9.8 kB
12 Access Control/127 Using online cracking services.en.srt
9.8 kB
05 IT Security Trends/032 Cyber War.it.srt
9.8 kB
13 Windows Security/137 BitLocker.it.srt
9.7 kB
11 Operating Systems Security/112 EXERCISE Removing malware.en.srt
9.7 kB
09 Network administration/080 How to analyze telnet protocol.it.srt
9.7 kB
09 Network administration/081 Intrusion detection.it.srt
9.6 kB
12 Access Control/120 Authentication protocols and services.it.srt
9.6 kB
13 Windows Security/136 Drive encryption.en.srt
9.5 kB
02 Application Security/007 SQL Injection.en.srt
9.4 kB
19 Cryptography/225 Asymmetric-key algorithms.it.srt
9.4 kB
20 Public Key Infrastructure/239 PKI Administration.it.srt
9.3 kB
02 Application Security/005 Introduction to Application Security.en.srt
9.2 kB
09 Network administration/075 Intrusion detection systems.en.srt
9.2 kB
13 Windows Security/131 UAC configuration.en.srt
9.2 kB
13 Windows Security/137 BitLocker.en.srt
9.2 kB
09 Network administration/080 How to analyze telnet protocol.en.srt
9.1 kB
09 Network administration/082 Scanning computers.it.srt
9.1 kB
11 Operating Systems Security/102 Three core.it.srt
9.1 kB
05 IT Security Trends/032 Cyber War.en.srt
9.0 kB
08 Designing Secure Computer Networks/069 IP SEC Phase 1.it.srt
9.0 kB
07 Computer Network Security/044 EXERCISE Data Link Layer Attack.it.srt
9.0 kB
13 Windows Security/139 File and folder encryption - EFS.it.srt
9.0 kB
12 Access Control/120 Authentication protocols and services.en.srt
8.9 kB
18 Application Security - Configuration and Management/210 Blocking applications.en.srt
8.9 kB
09 Network administration/081 Intrusion detection.en.srt
8.9 kB
15 Risk Management/164 EXERCISE Risk Assessment.it.srt
8.8 kB
17 Disaster Recovery/203 CONFICKER CASE STUDY.it.srt
8.7 kB
19 Cryptography/225 Asymmetric-key algorithms.en.srt
8.7 kB
12 Access Control/118 Authentication users.it.srt
8.7 kB
20 Public Key Infrastructure/239 PKI Administration.en.srt
8.7 kB
11 Operating Systems Security/103 EXERCISE OS boundaries.it.srt
8.7 kB
09 Network administration/077 Wireshark - Introduction to network analysis.it.srt
8.6 kB
19 Cryptography/223 Block cipher modes.it.srt
8.5 kB
19 Cryptography/221 DES-X.it.srt
8.5 kB
07 Computer Network Security/046 TCP Tunnelling over ICMP.it.srt
8.5 kB
11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.it.srt
8.4 kB
10 Wireless Networks Security/091 802.11 WEP.it.srt
8.4 kB
08 Designing Secure Computer Networks/069 IP SEC Phase 1.en.srt
8.4 kB
11 Operating Systems Security/102 Three core.en.srt
8.4 kB
10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.it.srt
8.4 kB
09 Network administration/082 Scanning computers.en.srt
8.4 kB
08 Designing Secure Computer Networks/063 Subnetting IPv4.it.srt
8.4 kB
18 Application Security - Configuration and Management/208 MS Update.it.srt
8.3 kB
13 Windows Security/139 File and folder encryption - EFS.en.srt
8.3 kB
15 Risk Management/155 Attack methods.it.srt
8.3 kB
20 Public Key Infrastructure/235 What will PKI allow you.it.srt
8.3 kB
15 Risk Management/164 EXERCISE Risk Assessment.en.srt
8.3 kB
07 Computer Network Security/043 Threats ARP Poisoning.it.srt
8.2 kB
12 Access Control/122 LM Hash.it.srt
8.2 kB
07 Computer Network Security/044 EXERCISE Data Link Layer Attack.en.srt
8.2 kB
06 Data Security/034 Objective 1 - Data security - Introduction.it.srt
8.2 kB
15 Risk Management/171 Fraud tools 1.it.srt
8.1 kB
12 Access Control/118 Authentication users.en.srt
8.1 kB
18 Application Security - Configuration and Management/213 Isolating applications.it.srt
8.0 kB
08 Designing Secure Computer Networks/063 Subnetting IPv4.en.srt
8.0 kB
17 Disaster Recovery/203 CONFICKER CASE STUDY.en.srt
8.0 kB
09 Network administration/077 Wireshark - Introduction to network analysis.en.srt
8.0 kB
11 Operating Systems Security/103 EXERCISE OS boundaries.en.srt
7.9 kB
11 Operating Systems Security/105 Kernel Mode Code Signing.it.srt
7.9 kB
11 Operating Systems Security/104 Process isolation.it.srt
7.9 kB
10 Wireless Networks Security/091 802.11 WEP.en.srt
7.9 kB
15 Risk Management/169 SE with KALI BackTrack.it.srt
7.9 kB
20 Public Key Infrastructure/233 Public key infrastructure.it.srt
7.9 kB
19 Cryptography/223 Block cipher modes.en.srt
7.9 kB
11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.en.srt
7.9 kB
19 Cryptography/220 Data encryption standard.it.srt
7.9 kB
07 Computer Network Security/046 TCP Tunnelling over ICMP.en.srt
7.9 kB
15 Risk Management/172 Fraud tools 2.it.srt
7.9 kB
07 Computer Network Security/045 OSI MODEL 3 - Network layer.it.srt
7.8 kB
20 Public Key Infrastructure/238 Certificate life cycle.it.srt
7.8 kB
19 Cryptography/221 DES-X.en.srt
7.8 kB
07 Computer Network Security/043 Threats ARP Poisoning.en.srt
7.8 kB
06 Data Security/035 Integrity of data.it.srt
7.8 kB
15 Risk Management/161 Introduction to risk assessment.it.srt
7.8 kB
18 Application Security - Configuration and Management/211 Software restrictions policies.it.srt
7.7 kB
19 Cryptography/230 Hybrid Schemes.it.srt
7.7 kB
10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.en.srt
7.7 kB
15 Risk Management/155 Attack methods.en.srt
7.7 kB
16 Defence in Depth/176 DiD OS and LAN Layers.it.srt
7.7 kB
18 Application Security - Configuration and Management/208 MS Update.en.srt
7.7 kB
12 Access Control/122 LM Hash.en.srt
7.7 kB
20 Public Key Infrastructure/235 What will PKI allow you.en.srt
7.7 kB
17 Disaster Recovery/201 Collecting and analysing evidence.it.srt
7.6 kB
10 Wireless Networks Security/094 Threats of WIFI networks.it.srt
7.6 kB
04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.it.srt
7.6 kB
08 Designing Secure Computer Networks/066 IPv6 address notation.it.srt
7.5 kB
15 Risk Management/169 SE with KALI BackTrack.en.srt
7.5 kB
11 Operating Systems Security/113 Rootkits.it.srt
7.5 kB
15 Risk Management/171 Fraud tools 1.en.srt
7.5 kB
07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.it.srt
7.5 kB
06 Data Security/034 Objective 1 - Data security - Introduction.en.srt
7.5 kB
20 Public Key Infrastructure/233 Public key infrastructure.en.srt
7.5 kB
13 Windows Security/130 User Account Control.it.srt
7.4 kB
15 Risk Management/168 EXERCISE Social Engineering attacks.it.srt
7.4 kB
05 IT Security Trends/030 Online privacy.it.srt
7.4 kB
10 Wireless Networks Security/086 WIFI - working principles.it.srt
7.4 kB
19 Cryptography/229 Digital signature.it.srt
7.4 kB
20 Public Key Infrastructure/238 Certificate life cycle.en.srt
7.4 kB
16 Defence in Depth/192 Laws for administrators.it.srt
7.3 kB
08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.it.srt
7.3 kB
11 Operating Systems Security/104 Process isolation.en.srt
7.3 kB
07 Computer Network Security/045 OSI MODEL 3 - Network layer.en.srt
7.3 kB
18 Application Security - Configuration and Management/213 Isolating applications.en.srt
7.3 kB
19 Cryptography/220 Data encryption standard.en.srt
7.3 kB
15 Risk Management/172 Fraud tools 2.en.srt
7.3 kB
11 Operating Systems Security/115 EXERCISE Security evaluation.it.srt
7.3 kB
07 Computer Network Security/042 Threats MAC spoofing.it.srt
7.3 kB
16 Defence in Depth/176 DiD OS and LAN Layers.en.srt
7.3 kB
19 Cryptography/217 Symmetric and asymmetric ciphers.it.srt
7.3 kB
10 Wireless Networks Security/092 802.11I WPA.it.srt
7.2 kB
15 Risk Management/161 Introduction to risk assessment.en.srt
7.2 kB
06 Data Security/035 Integrity of data.en.srt
7.2 kB
19 Cryptography/230 Hybrid Schemes.en.srt
7.2 kB
20 Public Key Infrastructure/234 Implementing public key infrastructure.it.srt
7.1 kB
11 Operating Systems Security/105 Kernel Mode Code Signing.en.srt
7.1 kB
19 Cryptography/219 Block ciphers.it.srt
7.1 kB
17 Disaster Recovery/201 Collecting and analysing evidence.en.srt
7.1 kB
08 Designing Secure Computer Networks/066 IPv6 address notation.en.srt
7.1 kB
07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.it.srt
7.0 kB
04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.en.srt
7.0 kB
07 Computer Network Security/040 OSI MODEL 1 - Physical layer.it.srt
7.0 kB
08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.en.srt
7.0 kB
15 Risk Management/168 EXERCISE Social Engineering attacks.en.srt
7.0 kB
04 Popular IT Security Myths/021 Popular myths about IT security - origins.it.srt
7.0 kB
07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.en.srt
7.0 kB
10 Wireless Networks Security/085 WIFI security solutions - introduction.it.srt
7.0 kB
09 Network administration/079 Analyzing Captured data.it.srt
6.9 kB
13 Windows Security/130 User Account Control.en.srt
6.9 kB
18 Application Security - Configuration and Management/211 Software restrictions policies.en.srt
6.9 kB
19 Cryptography/217 Symmetric and asymmetric ciphers.en.srt
6.9 kB
11 Operating Systems Security/113 Rootkits.en.srt
6.9 kB
16 Defence in Depth/192 Laws for administrators.en.srt
6.9 kB
07 Computer Network Security/039 Network security - introduction.it.srt
6.9 kB
10 Wireless Networks Security/094 Threats of WIFI networks.en.srt
6.9 kB
05 IT Security Trends/030 Online privacy.en.srt
6.8 kB
19 Cryptography/229 Digital signature.en.srt
6.8 kB
02 Application Security/013 Program security assessment.it.srt
6.8 kB
19 Cryptography/218 Symmetric-key algorithms.it.srt
6.8 kB
15 Risk Management/157 Target scanning and enumeration techniques 1.it.srt
6.8 kB
04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.it.srt
6.8 kB
10 Wireless Networks Security/086 WIFI - working principles.en.srt
6.8 kB
07 Computer Network Security/042 Threats MAC spoofing.en.srt
6.8 kB
16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.it.srt
6.8 kB
16 Defence in Depth/175 How to use Defence in Depth model.it.srt
6.7 kB
10 Wireless Networks Security/092 802.11I WPA.en.srt
6.7 kB
09 Network administration/076 Why are firewalls and NDIS not enough.it.srt
6.7 kB
11 Operating Systems Security/115 EXERCISE Security evaluation.en.srt
6.7 kB
03 Introduction to Cyber Threats/018 Lets look a few years back.it.srt
6.7 kB
09 Network administration/079 Analyzing Captured data.en.srt
6.7 kB
03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.it.srt
6.7 kB
13 Windows Security/140 EXERCISE EFS.it.srt
6.7 kB
14 Security Policies/147 Why are security solutions fallible.it.srt
6.6 kB
07 Computer Network Security/040 OSI MODEL 1 - Physical layer.en.srt
6.6 kB
19 Cryptography/219 Block ciphers.en.srt
6.6 kB
20 Public Key Infrastructure/234 Implementing public key infrastructure.en.srt
6.6 kB
04 Popular IT Security Myths/021 Popular myths about IT security - origins.en.srt
6.6 kB
09 Network administration/076 Why are firewalls and NDIS not enough.en.srt
6.5 kB
17 Disaster Recovery/195 How to reduce losses.it.srt
6.5 kB
10 Wireless Networks Security/085 WIFI security solutions - introduction.en.srt
6.5 kB
15 Risk Management/163 DREAD Exploitability.it.srt
6.5 kB
07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.en.srt
6.5 kB
19 Cryptography/228 HASH functions.it.srt
6.5 kB
07 Computer Network Security/039 Network security - introduction.en.srt
6.5 kB
06 Data Security/038 EXERCISE Finding confidential data with search engines.it.srt
6.4 kB
15 Risk Management/157 Target scanning and enumeration techniques 1.en.srt
6.4 kB
04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.en.srt
6.4 kB
07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.it.srt
6.4 kB
16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.en.srt
6.3 kB
14 Security Policies/149 Introduction to threat modelling and classification.it.srt
6.3 kB
16 Defence in Depth/175 How to use Defence in Depth model.en.srt
6.3 kB
07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.it.srt
6.2 kB
03 Introduction to Cyber Threats/017 IT Prehistory.it.srt
6.2 kB
02 Application Security/013 Program security assessment.en.srt
6.2 kB
07 Computer Network Security/056 EXERCISE Application Layer Attacks.it.srt
6.2 kB
03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.en.srt
6.2 kB
13 Windows Security/140 EXERCISE EFS.en.srt
6.2 kB
19 Cryptography/218 Symmetric-key algorithms.en.srt
6.2 kB
12 Access Control/119 How secure is your password.it.srt
6.2 kB
19 Cryptography/228 HASH functions.en.srt
6.2 kB
19 Cryptography/226 RSA.it.srt
6.2 kB
03 Introduction to Cyber Threats/018 Lets look a few years back.en.srt
6.2 kB
03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.it.srt
6.2 kB
06 Data Security/037 Confidentiality of data.it.srt
6.1 kB
06 Data Security/038 EXERCISE Finding confidential data with search engines.en.srt
6.1 kB
14 Security Policies/147 Why are security solutions fallible.en.srt
6.1 kB
17 Disaster Recovery/195 How to reduce losses.en.srt
6.1 kB
14 Security Policies/151 STRIDE Spoofing identity.it.srt
6.1 kB
05 IT Security Trends/029 Fake identity.it.srt
6.1 kB
15 Risk Management/163 DREAD Exploitability.en.srt
6.1 kB
07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.en.srt
6.0 kB
07 Computer Network Security/056 EXERCISE Application Layer Attacks.en.srt
6.0 kB
19 Cryptography/222 Advanced encryption standards.it.srt
5.9 kB
03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.en.srt
5.9 kB
10 Wireless Networks Security/096 Client Attacks Evil twin.it.srt
5.9 kB
11 Operating Systems Security/101 Security boundaries.it.srt
5.9 kB
12 Access Control/119 How secure is your password.en.srt
5.8 kB
17 Disaster Recovery/199 Audit users and keep control accounts.it.srt
5.8 kB
07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.en.srt
5.8 kB
07 Computer Network Security/041 OSI MODEL 2 - Data link layer.it.srt
5.8 kB
19 Cryptography/226 RSA.en.srt
5.8 kB
14 Security Policies/149 Introduction to threat modelling and classification.en.srt
5.8 kB
03 Introduction to Cyber Threats/017 IT Prehistory.en.srt
5.8 kB
16 Defence in Depth/179 Automated attack targeting a service.it.srt
5.8 kB
05 IT Security Trends/029 Fake identity.en.srt
5.7 kB
10 Wireless Networks Security/088 Threats and risks.it.srt
5.7 kB
06 Data Security/037 Confidentiality of data.en.srt
5.7 kB
14 Security Policies/151 STRIDE Spoofing identity.en.srt
5.7 kB
15 Risk Management/162 DREAD Risk assessment model.it.srt
5.6 kB
14 Security Policies/148 Security policy issues.it.srt
5.6 kB
14 Security Policies/146 Security issues.it.srt
5.6 kB
19 Cryptography/222 Advanced encryption standards.en.srt
5.6 kB
13 Windows Security/138 BitLocker To Go Reader.it.srt
5.6 kB
14 Security Policies/152 STRIDE Tampering with Data.it.srt
5.5 kB
16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.it.srt
5.5 kB
12 Access Control/123 Cached Credentials.it.srt
5.5 kB
07 Computer Network Security/059 Modifying Transmitted Packets.it.srt
5.5 kB
11 Operating Systems Security/101 Security boundaries.en.srt
5.5 kB
11 Operating Systems Security/106 Java Virtual Machine and code access security.it.srt
5.5 kB
16 Defence in Depth/180 Automated user-targeting attack.it.srt
5.4 kB
24 BONUS Section/245 BONUS LECTURE Learn more and get to know our other courses.html
5.4 kB
10 Wireless Networks Security/096 Client Attacks Evil twin.en.srt
5.4 kB
16 Defence in Depth/179 Automated attack targeting a service.en.srt
5.4 kB
07 Computer Network Security/041 OSI MODEL 2 - Data link layer.en.srt
5.4 kB
17 Disaster Recovery/197 Threat discovery 1.it.srt
5.3 kB
17 Disaster Recovery/199 Audit users and keep control accounts.en.srt
5.3 kB
15 Risk Management/162 DREAD Risk assessment model.en.srt
5.3 kB
16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.en.srt
5.3 kB
10 Wireless Networks Security/088 Threats and risks.en.srt
5.2 kB
14 Security Policies/148 Security policy issues.en.srt
5.2 kB
10 Wireless Networks Security/089 Ineffective solutions.it.srt
5.2 kB
07 Computer Network Security/059 Modifying Transmitted Packets.en.srt
5.2 kB
13 Windows Security/138 BitLocker To Go Reader.en.srt
5.2 kB
12 Access Control/123 Cached Credentials.en.srt
5.2 kB
14 Security Policies/146 Security issues.en.srt
5.1 kB
15 Risk Management/166 Introduction to Social Engineering and rogue software.it.srt
5.1 kB
16 Defence in Depth/180 Automated user-targeting attack.en.srt
5.1 kB
14 Security Policies/152 STRIDE Tampering with Data.en.srt
5.1 kB
11 Operating Systems Security/106 Java Virtual Machine and code access security.en.srt
5.0 kB
16 Defence in Depth/190 Law 9.it.srt
4.9 kB
10 Wireless Networks Security/089 Ineffective solutions.en.srt
4.8 kB
15 Risk Management/166 Introduction to Social Engineering and rogue software.en.srt
4.8 kB
17 Disaster Recovery/196 Ensuring continous availability.it.srt
4.8 kB
14 Security Policies/153 STRIDE Denial of Service.it.srt
4.8 kB
14 Security Policies/145 Information security - level up.it.srt
4.7 kB
16 Defence in Depth/190 Law 9.en.srt
4.7 kB
17 Disaster Recovery/197 Threat discovery 1.en.srt
4.7 kB
05 IT Security Trends/026 Trends in IT Security.it.srt
4.6 kB
05 IT Security Trends/028 EXERCISE How much info can you gather.it.srt
4.6 kB
14 Security Policies/144 Information security.it.srt
4.6 kB
07 Computer Network Security/049 Threats Enumerating Remote Computers.it.srt
4.5 kB
14 Security Policies/150 Threat modelling - STRIDE.it.srt
4.5 kB
17 Disaster Recovery/196 Ensuring continous availability.en.srt
4.5 kB
07 Computer Network Security/052 OSI MODEL 5 - Session Layer.it.srt
4.5 kB
17 Disaster Recovery/202 Forensics example.it.srt
4.4 kB
17 Disaster Recovery/198 Threat discovery 2.it.srt
4.4 kB
14 Security Policies/145 Information security - level up.en.srt
4.4 kB
14 Security Policies/153 STRIDE Denial of Service.en.srt
4.3 kB
05 IT Security Trends/028 EXERCISE How much info can you gather.en.srt
4.3 kB
07 Computer Network Security/055 OSI MODEL 7 - Application Layer.it.srt
4.3 kB
05 IT Security Trends/026 Trends in IT Security.en.srt
4.3 kB
07 Computer Network Security/055 OSI MODEL 7 - Application Layer.en.srt
4.3 kB
14 Security Policies/143 What is security.it.srt
4.2 kB
14 Security Policies/150 Threat modelling - STRIDE.en.srt
4.2 kB
19 Cryptography/224 Stream Ciphers - RC4.it.srt
4.2 kB
14 Security Policies/144 Information security.en.srt
4.2 kB
05 IT Security Trends/031 Analyzing sniffing software.it.srt
4.2 kB
10 Wireless Networks Security/098 EXERCISE WPA attack.it.srt
4.2 kB
07 Computer Network Security/052 OSI MODEL 5 - Session Layer.en.srt
4.2 kB
17 Disaster Recovery/202 Forensics example.en.srt
4.1 kB
17 Disaster Recovery/200 High risk users.it.srt
4.1 kB
07 Computer Network Security/049 Threats Enumerating Remote Computers.en.srt
4.1 kB
17 Disaster Recovery/198 Threat discovery 2.en.srt
4.0 kB
15 Risk Management/158 Target scanning and enumeration techniques 2.it.srt
4.0 kB
07 Computer Network Security/057 Backtrack Attack Demonstration.it.srt
4.0 kB
14 Security Policies/143 What is security.en.srt
4.0 kB
19 Cryptography/224 Stream Ciphers - RC4.en.srt
4.0 kB
10 Wireless Networks Security/098 EXERCISE WPA attack.en.srt
4.0 kB
16 Defence in Depth/186 Law 5.it.srt
3.9 kB
05 IT Security Trends/027 The birth of technology society.it.srt
3.8 kB
07 Computer Network Security/057 Backtrack Attack Demonstration.en.srt
3.8 kB
05 IT Security Trends/031 Analyzing sniffing software.en.srt
3.8 kB
15 Risk Management/156 Local attacks.it.srt
3.8 kB
15 Risk Management/158 Target scanning and enumeration techniques 2.en.srt
3.8 kB
08 Designing Secure Computer Networks/064 Subnetting IPv6.it.srt
3.7 kB
17 Disaster Recovery/200 High risk users.en.srt
3.7 kB
10 Wireless Networks Security/087 Other wireless technologies.it.srt
3.7 kB
16 Defence in Depth/186 Law 5.en.srt
3.6 kB
08 Designing Secure Computer Networks/064 Subnetting IPv6.en.srt
3.6 kB
16 Defence in Depth/183 Law 2.it.srt
3.6 kB
05 IT Security Trends/027 The birth of technology society.en.srt
3.5 kB
07 Computer Network Security/060 Unencrypted protocols.it.srt
3.5 kB
01 Lets start/002 Foreword FAQ.html
3.5 kB
18 Application Security - Configuration and Management/207 Software updates.it.srt
3.4 kB
18 Application Security - Configuration and Management/209 System Center Configuration Manager.it.srt
3.4 kB
10 Wireless Networks Security/087 Other wireless technologies.en.srt
3.4 kB
15 Risk Management/156 Local attacks.en.srt
3.4 kB
07 Computer Network Security/060 Unencrypted protocols.en.srt
3.3 kB
16 Defence in Depth/183 Law 2.en.srt
3.3 kB
18 Application Security - Configuration and Management/209 System Center Configuration Manager.en.srt
3.2 kB
18 Application Security - Configuration and Management/207 Software updates.en.srt
3.2 kB
16 Defence in Depth/178 DiD Demonstration.it.srt
3.2 kB
07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.it.srt
3.1 kB
07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.en.srt
3.0 kB
15 Risk Management/170 Rogue Software.it.srt
2.9 kB
16 Defence in Depth/178 DiD Demonstration.en.srt
2.9 kB
20 Public Key Infrastructure/232 Introduction to cryptology.it.srt
2.9 kB
15 Risk Management/170 Rogue Software.en.srt
2.8 kB
20 Public Key Infrastructure/232 Introduction to cryptology.en.srt
2.7 kB
16 Defence in Depth/187 Law 6.it.srt
2.7 kB
08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.it.srt
2.7 kB
16 Defence in Depth/184 Law 3.it.srt
2.7 kB
16 Defence in Depth/184 Law 3.en.srt
2.5 kB
08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.en.srt
2.5 kB
16 Defence in Depth/187 Law 6.en.srt
2.5 kB
14 Security Policies/142 Security policies introduction.it.srt
2.4 kB
19 Cryptography/227 ELGAMAL.it.srt
2.4 kB
15 Risk Management/159 Passive scanning.it.srt
2.3 kB
12 Access Control/117 Authentication and authorisation - Introduction.it.srt
2.2 kB
19 Cryptography/227 ELGAMAL.en.srt
2.2 kB
16 Defence in Depth/185 Law 4.it.srt
2.2 kB
14 Security Policies/142 Security policies introduction.en.srt
2.2 kB
15 Risk Management/159 Passive scanning.en.srt
2.1 kB
12 Access Control/117 Authentication and authorisation - Introduction.en.srt
2.0 kB
16 Defence in Depth/185 Law 4.en.srt
2.0 kB
17 Disaster Recovery/194 Introduction to Disaster Recovery.it.srt
1.9 kB
16 Defence in Depth/189 Law 8.it.srt
1.8 kB
16 Defence in Depth/174 Introduction to Defence in Depth.it.srt
1.8 kB
16 Defence in Depth/189 Law 8.en.srt
1.8 kB
15 Risk Management/154 Introduction to Risk Management.it.srt
1.8 kB
13 Windows Security/133 PatchGuard.it.srt
1.8 kB
17 Disaster Recovery/194 Introduction to Disaster Recovery.en.srt
1.7 kB
16 Defence in Depth/174 Introduction to Defence in Depth.en.srt
1.7 kB
15 Risk Management/154 Introduction to Risk Management.en.srt
1.7 kB
13 Windows Security/133 PatchGuard.en.srt
1.6 kB
10 Wireless Networks Security/084 Wireless Networks.it.srt
1.5 kB
16 Defence in Depth/188 Law 7.it.srt
1.5 kB
13 Windows Security/129 Windows Security - what youll learn.it.srt
1.5 kB
04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.it.srt
1.5 kB
10 Wireless Networks Security/084 Wireless Networks.en.srt
1.4 kB
13 Windows Security/129 Windows Security - what youll learn.en.srt
1.4 kB
16 Defence in Depth/188 Law 7.en.srt
1.4 kB
09 Network administration/073 Introduction to Monitoring Transmitted Data.it.srt
1.4 kB
09 Network administration/073 Introduction to Monitoring Transmitted Data.en.srt
1.3 kB
04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.en.srt
1.3 kB
18 Application Security - Configuration and Management/205 Heres what youll learn in this module.it.srt
1.3 kB
02 Application Security/004 Why is this section here.html
1.2 kB
24 BONUS Section/246 Thank you.html
1.2 kB
01 Lets start/001 Welcome to the course.html
1.2 kB
18 Application Security - Configuration and Management/205 Heres what youll learn in this module.en.srt
1.2 kB
Read Me.txt
1.0 kB
18 Application Security - Configuration and Management/214 How to protect users without interrupting their work - notes for the examination.html
931 Bytes
20 Public Key Infrastructure/241 Public Key Infrastructure - Trust but verify - notes for the examination.html
923 Bytes
15 Risk Management/173 Social Engineering and Rogue Software - notes for the examination.html
916 Bytes
20 Public Key Infrastructure/240 Threat Modelling and Classification - notes for the examination.html
914 Bytes
19 Cryptography/231 Symmetric and Asymmetric Ciphers - notes for the examination.html
911 Bytes
02 Application Security/015 Program Security Assessment - notes for the examination.html
906 Bytes
16 Defence in Depth/181 The Defence in Depth Model - notes for the examination.html
905 Bytes
16 Defence in Depth/193 Immutable Laws of Security - notes for the examination.html
905 Bytes
15 Risk Management/160 Attack Methodologies - notes for the examination.html
899 Bytes
17 Disaster Recovery/204 How to reduce losses - notes for the examination.html
899 Bytes
02 Application Security/012 Application Attacks - notes for the examination.html
898 Bytes
15 Risk Management/165 Risk Assessment - notes for the examination.html
894 Bytes
16 Defence in Depth/191 Law 10.it.srt
865 Bytes
16 Defence in Depth/191 Law 10.en.srt
791 Bytes
02 Application Security/external-assets-links.txt
137 Bytes
[FreeAllCourse.Com].url
52 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>