搜索
[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
磁力链接/BT种子名称
[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
磁力链接/BT种子简介
种子哈希:
f9a76b3330f136f3d27ceaf9507ff46d71cd13dd
文件大小:
4.79G
已经下载:
602
次
下载速度:
极快
收录时间:
2021-03-22
最近下载:
2025-10-23
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:F9A76B3330F136F3D27CEAF9507FF46D71CD13DD
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
母狗园
51动漫
91短视频
抖音Max
海王TV
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
91暗网
最近搜索
coreldraw
饼干姐姐+圣诞
mia+split
小说
+princess
mizd-449
蜂腰
まきせ+くりす
achj-077
女王穿戴大屌
我婆婆037
clock
儿媳
vrxs系列
candy love
老舅
bangbus.16.04.27.layla.london
凉森
adv
rj01469333
cawd-827
约拍粉嫩美乳模特,从床上干到沙发再站立后
刘依婷
private.com
霍比人 2160
lantern
sivr-169
elephorm
汉庭酒店客房部主管赵柏君+寂寞难耐的离异少妇如何抵挡热血青春的小奶g
小骚货
文件列表
01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.mp4
223.9 MB
23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.mp4
188.6 MB
11 Operating Systems Security/114 EXERCISE Detecting rootkits.mp4
61.1 MB
08 Designing Secure Computer Networks/070 Network Address translation.mp4
55.2 MB
12 Access Control/124 KERBEROS.mp4
55.1 MB
08 Designing Secure Computer Networks/071 Network access control RADIUS.mp4
50.8 MB
11 Operating Systems Security/100 Operating systems security - introduction.mp4
50.4 MB
11 Operating Systems Security/109 EXERCISE Vulnerability attacks.mp4
49.9 MB
09 Network administration/081 Intrusion detection.mp4
48.6 MB
13 Windows Security/135 Encryption - key protection.mp4
48.6 MB
11 Operating Systems Security/112 EXERCISE Removing malware.mp4
48.1 MB
12 Access Control/126 EXERCISE Offline attacks.mp4
47.9 MB
05 IT Security Trends/032 Cyber War.mp4
47.6 MB
11 Operating Systems Security/108 Malware.mp4
47.0 MB
08 Designing Secure Computer Networks/068 Protocols and services IP SEC.mp4
45.9 MB
09 Network administration/078 How to use Wireshark.mp4
45.7 MB
12 Access Control/125 Identity Theft.mp4
45.0 MB
09 Network administration/074 Monitoring Transmitted Data - Basic informations.mp4
43.1 MB
13 Windows Security/132 Additional Security Features - ASLR and DEP.mp4
42.9 MB
11 Operating Systems Security/103 EXERCISE OS boundaries.mp4
41.0 MB
06 Data Security/034 Objective 1 - Data security - Introduction.mp4
40.7 MB
09 Network administration/075 Intrusion detection systems.mp4
40.1 MB
11 Operating Systems Security/111 Demonstration Process Explorer.mp4
40.0 MB
09 Network administration/080 How to analyze telnet protocol.mp4
39.8 MB
12 Access Control/127 Using online cracking services.mp4
39.5 MB
07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.mp4
39.2 MB
13 Windows Security/136 Drive encryption.mp4
39.1 MB
10 Wireless Networks Security/090 Authentication methods.mp4
38.9 MB
10 Wireless Networks Security/097 Client Attacks Denial of service.mp4
38.3 MB
13 Windows Security/137 BitLocker.mp4
38.2 MB
07 Computer Network Security/044 EXERCISE Data Link Layer Attack.mp4
37.0 MB
09 Network administration/082 Scanning computers.mp4
37.0 MB
13 Windows Security/131 UAC configuration.mp4
36.8 MB
07 Computer Network Security/046 TCP Tunnelling over ICMP.mp4
36.7 MB
13 Windows Security/139 File and folder encryption - EFS.mp4
36.2 MB
10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.mp4
35.2 MB
06 Data Security/035 Integrity of data.mp4
33.7 MB
05 IT Security Trends/030 Online privacy.mp4
33.6 MB
13 Windows Security/130 User Account Control.mp4
33.6 MB
12 Access Control/120 Authentication protocols and services.mp4
33.4 MB
07 Computer Network Security/045 OSI MODEL 3 - Network layer.mp4
33.2 MB
06 Data Security/037 Confidentiality of data.mp4
33.2 MB
10 Wireless Networks Security/092 802.11I WPA.mp4
33.1 MB
10 Wireless Networks Security/091 802.11 WEP.mp4
32.9 MB
12 Access Control/118 Authentication users.mp4
32.9 MB
07 Computer Network Security/043 Threats ARP Poisoning.mp4
32.8 MB
09 Network administration/079 Analyzing Captured data.mp4
32.5 MB
12 Access Control/122 LM Hash.mp4
32.2 MB
09 Network administration/077 Wireshark - Introduction to network analysis.mp4
32.1 MB
10 Wireless Networks Security/094 Threats of WIFI networks.mp4
32.0 MB
08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.mp4
31.7 MB
11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.mp4
31.4 MB
11 Operating Systems Security/102 Three core.mp4
31.2 MB
02 Application Security/010 Automated SQL Injection.mp4
30.9 MB
10 Wireless Networks Security/086 WIFI - working principles.mp4
30.8 MB
04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.mp4
30.6 MB
10 Wireless Networks Security/085 WIFI security solutions - introduction.mp4
30.6 MB
08 Designing Secure Computer Networks/063 Subnetting IPv4.mp4
30.5 MB
02 Application Security/011 Cross-site scripting - XSS.mp4
30.5 MB
07 Computer Network Security/040 OSI MODEL 1 - Physical layer.mp4
30.4 MB
11 Operating Systems Security/113 Rootkits.mp4
30.3 MB
02 Application Security/008 EXERCISE Analyze the application.mp4
30.1 MB
07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.mp4
30.0 MB
09 Network administration/076 Why are firewalls and NDIS not enough.mp4
29.6 MB
04 Popular IT Security Myths/021 Popular myths about IT security - origins.mp4
29.3 MB
07 Computer Network Security/042 Threats MAC spoofing.mp4
28.8 MB
08 Designing Secure Computer Networks/066 IPv6 address notation.mp4
28.6 MB
18 Application Security - Configuration and Management/212 EXERCISE Application control rules.mp4
28.5 MB
11 Operating Systems Security/104 Process isolation.mp4
28.2 MB
07 Computer Network Security/059 Modifying Transmitted Packets.mp4
28.1 MB
07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4
27.4 MB
03 Introduction to Cyber Threats/017 IT Prehistory.mp4
27.1 MB
04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.mp4
27.0 MB
11 Operating Systems Security/105 Kernel Mode Code Signing.mp4
26.9 MB
02 Application Security/006 Attacks on applications.mp4
26.7 MB
19 Cryptography/216 History of ciphers.mp4
26.7 MB
02 Application Security/014 Unsafe applications.mp4
26.2 MB
03 Introduction to Cyber Threats/018 Lets look a few years back.mp4
24.8 MB
19 Cryptography/215 Introduction to cryptography.mp4
24.7 MB
06 Data Security/038 EXERCISE Finding confidential data with search engines.mp4
24.6 MB
10 Wireless Networks Security/096 Client Attacks Evil twin.mp4
23.9 MB
07 Computer Network Security/041 OSI MODEL 2 - Data link layer.mp4
23.9 MB
20 Public Key Infrastructure/237 Planning the PKI.mp4
23.6 MB
02 Application Security/009 Blind SQL Injection.mp4
23.6 MB
15 Risk Management/167 Manipulation tactics.mp4
23.2 MB
07 Computer Network Security/039 Network security - introduction.mp4
23.1 MB
05 IT Security Trends/029 Fake identity.mp4
22.8 MB
08 Designing Secure Computer Networks/069 IP SEC Phase 1.mp4
22.8 MB
03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.mp4
22.3 MB
02 Application Security/005 Introduction to Application Security.mp4
22.3 MB
11 Operating Systems Security/101 Security boundaries.mp4
22.2 MB
20 Public Key Infrastructure/236 EXERCISE Certificates.mp4
21.6 MB
03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.mp4
21.5 MB
15 Risk Management/171 Fraud tools 1.mp4
21.0 MB
17 Disaster Recovery/203 CONFICKER CASE STUDY.mp4
21.0 MB
20 Public Key Infrastructure/239 PKI Administration.mp4
20.6 MB
05 IT Security Trends/031 Analyzing sniffing software.mp4
20.4 MB
19 Cryptography/225 Asymmetric-key algorithms.mp4
20.0 MB
15 Risk Management/168 EXERCISE Social Engineering attacks.mp4
19.9 MB
07 Computer Network Security/056 EXERCISE Application Layer Attacks.mp4
19.9 MB
10 Wireless Networks Security/089 Ineffective solutions.mp4
19.9 MB
05 IT Security Trends/026 Trends in IT Security.mp4
19.6 MB
11 Operating Systems Security/106 Java Virtual Machine and code access security.mp4
19.5 MB
05 IT Security Trends/027 The birth of technology society.mp4
19.5 MB
10 Wireless Networks Security/088 Threats and risks.mp4
19.4 MB
13 Windows Security/138 BitLocker To Go Reader.mp4
19.3 MB
17 Disaster Recovery/201 Collecting and analysing evidence.mp4
19.2 MB
19 Cryptography/221 DES-X.mp4
19.1 MB
15 Risk Management/161 Introduction to risk assessment.mp4
19.0 MB
15 Risk Management/164 EXERCISE Risk Assessment.mp4
19.0 MB
12 Access Control/123 Cached Credentials.mp4
19.0 MB
18 Application Security - Configuration and Management/210 Blocking applications.mp4
18.9 MB
02 Application Security/007 SQL Injection.mp4
18.8 MB
11 Operating Systems Security/115 EXERCISE Security evaluation.mp4
18.7 MB
15 Risk Management/172 Fraud tools 2.mp4
18.6 MB
19 Cryptography/223 Block cipher modes.mp4
18.3 MB
08 Designing Secure Computer Networks/064 Subnetting IPv6.mp4
18.3 MB
15 Risk Management/155 Attack methods.mp4
18.1 MB
18 Application Security - Configuration and Management/206 Managing applications.mp4
18.0 MB
07 Computer Network Security/055 OSI MODEL 7 - Application Layer.mp4
17.7 MB
18 Application Security - Configuration and Management/213 Isolating applications.mp4
17.7 MB
07 Computer Network Security/049 Threats Enumerating Remote Computers.mp4
17.6 MB
19 Cryptography/220 Data encryption standard.mp4
17.3 MB
07 Computer Network Security/052 OSI MODEL 5 - Session Layer.mp4
17.2 MB
18 Application Security - Configuration and Management/208 MS Update.mp4
17.0 MB
20 Public Key Infrastructure/238 Certificate life cycle.mp4
17.0 MB
15 Risk Management/169 SE with KALI BackTrack.mp4
16.9 MB
16 Defence in Depth/176 DiD OS and LAN Layers.mp4
16.9 MB
19 Cryptography/230 Hybrid Schemes.mp4
16.8 MB
12 Access Control/119 How secure is your password.mp4
16.7 MB
15 Risk Management/157 Target scanning and enumeration techniques 1.mp4
16.6 MB
07 Computer Network Security/057 Backtrack Attack Demonstration.mp4
16.3 MB
14 Security Policies/147 Why are security solutions fallible.mp4
16.2 MB
19 Cryptography/229 Digital signature.mp4
16.2 MB
19 Cryptography/219 Block ciphers.mp4
16.1 MB
13 Windows Security/140 EXERCISE EFS.mp4
16.1 MB
16 Defence in Depth/179 Automated attack targeting a service.mp4
15.9 MB
19 Cryptography/217 Symmetric and asymmetric ciphers.mp4
15.8 MB
17 Disaster Recovery/195 How to reduce losses.mp4
15.6 MB
20 Public Key Infrastructure/233 Public key infrastructure.mp4
15.5 MB
16 Defence in Depth/175 How to use Defence in Depth model.mp4
15.4 MB
18 Application Security - Configuration and Management/211 Software restrictions policies.mp4
15.2 MB
20 Public Key Infrastructure/235 What will PKI allow you.mp4
15.2 MB
19 Cryptography/228 HASH functions.mp4
15.1 MB
07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.mp4
14.9 MB
16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.mp4
14.7 MB
15 Risk Management/163 DREAD Exploitability.mp4
14.6 MB
16 Defence in Depth/192 Laws for administrators.mp4
14.5 MB
14 Security Policies/151 STRIDE Spoofing identity.mp4
14.5 MB
05 IT Security Trends/028 EXERCISE How much info can you gather.mp4
14.4 MB
07 Computer Network Security/060 Unencrypted protocols.mp4
14.3 MB
19 Cryptography/218 Symmetric-key algorithms.mp4
14.2 MB
16 Defence in Depth/180 Automated user-targeting attack.mp4
14.1 MB
14 Security Policies/149 Introduction to threat modelling and classification.mp4
13.9 MB
17 Disaster Recovery/199 Audit users and keep control accounts.mp4
13.9 MB
10 Wireless Networks Security/087 Other wireless technologies.mp4
13.8 MB
16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.mp4
13.5 MB
14 Security Policies/152 STRIDE Tampering with Data.mp4
13.5 MB
07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4
13.5 MB
14 Security Policies/146 Security issues.mp4
13.5 MB
19 Cryptography/226 RSA.mp4
13.5 MB
19 Cryptography/222 Advanced encryption standards.mp4
13.5 MB
20 Public Key Infrastructure/234 Implementing public key infrastructure.mp4
13.4 MB
15 Risk Management/162 DREAD Risk assessment model.mp4
13.3 MB
14 Security Policies/148 Security policy issues.mp4
13.2 MB
17 Disaster Recovery/197 Threat discovery 1.mp4
12.9 MB
02 Application Security/013 Program security assessment.mp4
12.7 MB
15 Risk Management/166 Introduction to Social Engineering and rogue software.mp4
12.0 MB
08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.mp4
11.5 MB
14 Security Policies/143 What is security.mp4
11.4 MB
17 Disaster Recovery/196 Ensuring continous availability.mp4
11.3 MB
17 Disaster Recovery/202 Forensics example.mp4
11.1 MB
14 Security Policies/150 Threat modelling - STRIDE.mp4
11.1 MB
14 Security Policies/153 STRIDE Denial of Service.mp4
10.9 MB
14 Security Policies/144 Information security.mp4
10.8 MB
14 Security Policies/145 Information security - level up.mp4
10.3 MB
12 Access Control/117 Authentication and authorisation - Introduction.mp4
10.1 MB
16 Defence in Depth/190 Law 9.mp4
9.7 MB
10 Wireless Networks Security/098 EXERCISE WPA attack.mp4
9.3 MB
17 Disaster Recovery/198 Threat discovery 2.mp4
9.3 MB
16 Defence in Depth/186 Law 5.mp4
9.2 MB
19 Cryptography/224 Stream Ciphers - RC4.mp4
9.0 MB
15 Risk Management/158 Target scanning and enumeration techniques 2.mp4
8.8 MB
17 Disaster Recovery/200 High risk users.mp4
8.3 MB
15 Risk Management/156 Local attacks.mp4
8.3 MB
13 Windows Security/133 PatchGuard.mp4
8.2 MB
13 Windows Security/129 Windows Security - what youll learn.mp4
8.0 MB
16 Defence in Depth/183 Law 2.mp4
8.0 MB
15 Risk Management/170 Rogue Software.mp4
7.7 MB
15 Risk Management/159 Passive scanning.mp4
7.5 MB
16 Defence in Depth/178 DiD Demonstration.mp4
7.3 MB
10 Wireless Networks Security/084 Wireless Networks.mp4
7.3 MB
18 Application Security - Configuration and Management/209 System Center Configuration Manager.mp4
6.6 MB
18 Application Security - Configuration and Management/207 Software updates.mp4
6.5 MB
09 Network administration/073 Introduction to Monitoring Transmitted Data.mp4
6.5 MB
04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.mp4
6.3 MB
20 Public Key Infrastructure/232 Introduction to cryptology.mp4
6.3 MB
16 Defence in Depth/185 Law 4.mp4
6.2 MB
14 Security Policies/142 Security policies introduction.mp4
6.2 MB
16 Defence in Depth/184 Law 3.mp4
6.1 MB
16 Defence in Depth/187 Law 6.mp4
6.1 MB
19 Cryptography/227 ELGAMAL.mp4
5.1 MB
16 Defence in Depth/189 Law 8.mp4
4.8 MB
16 Defence in Depth/174 Introduction to Defence in Depth.mp4
4.8 MB
17 Disaster Recovery/194 Introduction to Disaster Recovery.mp4
4.6 MB
11 Operating Systems Security/107 10-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
4.5 MB
15 Risk Management/154 Introduction to Risk Management.mp4
4.1 MB
18 Application Security - Configuration and Management/205 Heres what youll learn in this module.mp4
3.3 MB
16 Defence in Depth/188 Law 7.mp4
3.0 MB
15 Risk Management/173 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
3.0 MB
12 Access Control/121 11-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
3.0 MB
19 Cryptography/231 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.6 MB
11 Operating Systems Security/116 10-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.6 MB
17 Disaster Recovery/204 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.6 MB
07 Computer Network Security/047 06-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.3 MB
20 Public Key Infrastructure/241 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.3 MB
07 Computer Network Security/061 06-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.3 MB
12 Access Control/128 11-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.2 MB
05 IT Security Trends/033 01-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.1 MB
06 Data Security/036 01-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
2.1 MB
16 Defence in Depth/191 Law 10.mp4
2.1 MB
15 Risk Management/165 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.9 MB
09 Network administration/083 08-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.9 MB
10 Wireless Networks Security/099 09-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.8 MB
02 Application Security/012 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
16 Defence in Depth/181 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
16 Defence in Depth/193 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
18 Application Security - Configuration and Management/214 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
15 Risk Management/160 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
13 Windows Security/141 12-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.7 MB
03 Introduction to Cyber Threats/020 01-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
10 Wireless Networks Security/093 09-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
13 Windows Security/134 12-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
20 Public Key Infrastructure/240 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
08 Designing Secure Computer Networks/065 07-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.5 MB
08 Designing Secure Computer Networks/072 07-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.3 MB
07 Computer Network Security/053 06-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.2 MB
02 Application Security/015 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.1 MB
04 Popular IT Security Myths/025 01-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf
1.0 MB
22 Certificate/242 Certificate-Itsec.pdf
494.0 kB
24 BONUS Section/244 Secacademy-Voucher.pdf
95.6 kB
01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.it.srt
27.7 kB
01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.en.srt
25.7 kB
23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.it.srt
18.1 kB
13 Windows Security/135 Encryption - key protection.it.srt
17.9 kB
02 Application Security/008 EXERCISE Analyze the application.it.srt
17.1 kB
23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.en.srt
16.8 kB
13 Windows Security/135 Encryption - key protection.en.srt
16.5 kB
02 Application Security/008 EXERCISE Analyze the application.en.srt
16.1 kB
11 Operating Systems Security/108 Malware.it.srt
15.5 kB
02 Application Security/010 Automated SQL Injection.it.srt
15.3 kB
18 Application Security - Configuration and Management/212 EXERCISE Application control rules.it.srt
15.2 kB
08 Designing Secure Computer Networks/070 Network Address translation.it.srt
14.6 kB
11 Operating Systems Security/108 Malware.en.srt
14.4 kB
13 Windows Security/132 Additional Security Features - ASLR and DEP.it.srt
14.2 kB
12 Access Control/126 EXERCISE Offline attacks.it.srt
14.1 kB
02 Application Security/010 Automated SQL Injection.en.srt
14.0 kB
08 Designing Secure Computer Networks/070 Network Address translation.en.srt
13.8 kB
18 Application Security - Configuration and Management/212 EXERCISE Application control rules.en.srt
13.7 kB
12 Access Control/124 KERBEROS.it.srt
13.6 kB
11 Operating Systems Security/114 EXERCISE Detecting rootkits.it.srt
13.5 kB
19 Cryptography/216 History of ciphers.it.srt
13.4 kB
12 Access Control/126 EXERCISE Offline attacks.en.srt
13.2 kB
13 Windows Security/132 Additional Security Features - ASLR and DEP.en.srt
13.2 kB
02 Application Security/006 Attacks on applications.it.srt
13.1 kB
08 Designing Secure Computer Networks/071 Network access control RADIUS.it.srt
13.0 kB
02 Application Security/014 Unsafe applications.it.srt
12.9 kB
19 Cryptography/215 Introduction to cryptography.it.srt
12.7 kB
19 Cryptography/216 History of ciphers.en.srt
12.5 kB
02 Application Security/011 Cross-site scripting - XSS.it.srt
12.5 kB
12 Access Control/124 KERBEROS.en.srt
12.5 kB
02 Application Security/009 Blind SQL Injection.it.srt
12.4 kB
11 Operating Systems Security/114 EXERCISE Detecting rootkits.en.srt
12.4 kB
08 Designing Secure Computer Networks/071 Network access control RADIUS.en.srt
12.3 kB
02 Application Security/006 Attacks on applications.en.srt
12.0 kB
02 Application Security/014 Unsafe applications.en.srt
11.9 kB
08 Designing Secure Computer Networks/068 Protocols and services IP SEC.it.srt
11.7 kB
12 Access Control/125 Identity Theft.it.srt
11.6 kB
19 Cryptography/215 Introduction to cryptography.en.srt
11.6 kB
11 Operating Systems Security/109 EXERCISE Vulnerability attacks.it.srt
11.6 kB
18 Application Security - Configuration and Management/206 Managing applications.it.srt
11.4 kB
10 Wireless Networks Security/097 Client Attacks Denial of service.it.srt
11.4 kB
02 Application Security/011 Cross-site scripting - XSS.en.srt
11.4 kB
02 Application Security/009 Blind SQL Injection.en.srt
11.3 kB
11 Operating Systems Security/100 Operating systems security - introduction.it.srt
11.3 kB
09 Network administration/078 How to use Wireshark.it.srt
11.3 kB
15 Risk Management/167 Manipulation tactics.it.srt
11.1 kB
20 Public Key Infrastructure/237 Planning the PKI.it.srt
11.1 kB
11 Operating Systems Security/111 Demonstration Process Explorer.it.srt
11.0 kB
20 Public Key Infrastructure/236 EXERCISE Certificates.it.srt
11.0 kB
08 Designing Secure Computer Networks/068 Protocols and services IP SEC.en.srt
10.8 kB
09 Network administration/074 Monitoring Transmitted Data - Basic informations.it.srt
10.8 kB
12 Access Control/125 Identity Theft.en.srt
10.7 kB
11 Operating Systems Security/109 EXERCISE Vulnerability attacks.en.srt
10.7 kB
15 Risk Management/167 Manipulation tactics.en.srt
10.7 kB
10 Wireless Networks Security/090 Authentication methods.it.srt
10.7 kB
11 Operating Systems Security/112 EXERCISE Removing malware.it.srt
10.6 kB
10 Wireless Networks Security/097 Client Attacks Denial of service.en.srt
10.6 kB
11 Operating Systems Security/100 Operating systems security - introduction.en.srt
10.5 kB
12 Access Control/127 Using online cracking services.it.srt
10.5 kB
20 Public Key Infrastructure/237 Planning the PKI.en.srt
10.5 kB
18 Application Security - Configuration and Management/206 Managing applications.en.srt
10.5 kB
09 Network administration/078 How to use Wireshark.en.srt
10.4 kB
20 Public Key Infrastructure/236 EXERCISE Certificates.en.srt
10.4 kB
02 Application Security/007 SQL Injection.it.srt
10.2 kB
11 Operating Systems Security/111 Demonstration Process Explorer.en.srt
10.1 kB
13 Windows Security/136 Drive encryption.it.srt
10.1 kB
02 Application Security/005 Introduction to Application Security.it.srt
10.1 kB
10 Wireless Networks Security/090 Authentication methods.en.srt
10.0 kB
09 Network administration/074 Monitoring Transmitted Data - Basic informations.en.srt
10.0 kB
09 Network administration/075 Intrusion detection systems.it.srt
9.9 kB
13 Windows Security/131 UAC configuration.it.srt
9.9 kB
18 Application Security - Configuration and Management/210 Blocking applications.it.srt
9.8 kB
12 Access Control/127 Using online cracking services.en.srt
9.8 kB
05 IT Security Trends/032 Cyber War.it.srt
9.8 kB
13 Windows Security/137 BitLocker.it.srt
9.7 kB
11 Operating Systems Security/112 EXERCISE Removing malware.en.srt
9.7 kB
09 Network administration/080 How to analyze telnet protocol.it.srt
9.7 kB
09 Network administration/081 Intrusion detection.it.srt
9.6 kB
12 Access Control/120 Authentication protocols and services.it.srt
9.6 kB
13 Windows Security/136 Drive encryption.en.srt
9.5 kB
02 Application Security/007 SQL Injection.en.srt
9.4 kB
19 Cryptography/225 Asymmetric-key algorithms.it.srt
9.4 kB
20 Public Key Infrastructure/239 PKI Administration.it.srt
9.3 kB
02 Application Security/005 Introduction to Application Security.en.srt
9.2 kB
09 Network administration/075 Intrusion detection systems.en.srt
9.2 kB
13 Windows Security/131 UAC configuration.en.srt
9.2 kB
13 Windows Security/137 BitLocker.en.srt
9.2 kB
09 Network administration/080 How to analyze telnet protocol.en.srt
9.1 kB
09 Network administration/082 Scanning computers.it.srt
9.1 kB
11 Operating Systems Security/102 Three core.it.srt
9.1 kB
05 IT Security Trends/032 Cyber War.en.srt
9.0 kB
08 Designing Secure Computer Networks/069 IP SEC Phase 1.it.srt
9.0 kB
07 Computer Network Security/044 EXERCISE Data Link Layer Attack.it.srt
9.0 kB
13 Windows Security/139 File and folder encryption - EFS.it.srt
9.0 kB
12 Access Control/120 Authentication protocols and services.en.srt
8.9 kB
18 Application Security - Configuration and Management/210 Blocking applications.en.srt
8.9 kB
09 Network administration/081 Intrusion detection.en.srt
8.9 kB
15 Risk Management/164 EXERCISE Risk Assessment.it.srt
8.8 kB
17 Disaster Recovery/203 CONFICKER CASE STUDY.it.srt
8.7 kB
19 Cryptography/225 Asymmetric-key algorithms.en.srt
8.7 kB
12 Access Control/118 Authentication users.it.srt
8.7 kB
20 Public Key Infrastructure/239 PKI Administration.en.srt
8.7 kB
11 Operating Systems Security/103 EXERCISE OS boundaries.it.srt
8.7 kB
09 Network administration/077 Wireshark - Introduction to network analysis.it.srt
8.6 kB
19 Cryptography/223 Block cipher modes.it.srt
8.5 kB
19 Cryptography/221 DES-X.it.srt
8.5 kB
07 Computer Network Security/046 TCP Tunnelling over ICMP.it.srt
8.5 kB
11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.it.srt
8.4 kB
10 Wireless Networks Security/091 802.11 WEP.it.srt
8.4 kB
08 Designing Secure Computer Networks/069 IP SEC Phase 1.en.srt
8.4 kB
11 Operating Systems Security/102 Three core.en.srt
8.4 kB
10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.it.srt
8.4 kB
09 Network administration/082 Scanning computers.en.srt
8.4 kB
08 Designing Secure Computer Networks/063 Subnetting IPv4.it.srt
8.4 kB
18 Application Security - Configuration and Management/208 MS Update.it.srt
8.3 kB
13 Windows Security/139 File and folder encryption - EFS.en.srt
8.3 kB
15 Risk Management/155 Attack methods.it.srt
8.3 kB
20 Public Key Infrastructure/235 What will PKI allow you.it.srt
8.3 kB
15 Risk Management/164 EXERCISE Risk Assessment.en.srt
8.3 kB
07 Computer Network Security/043 Threats ARP Poisoning.it.srt
8.2 kB
12 Access Control/122 LM Hash.it.srt
8.2 kB
07 Computer Network Security/044 EXERCISE Data Link Layer Attack.en.srt
8.2 kB
06 Data Security/034 Objective 1 - Data security - Introduction.it.srt
8.2 kB
15 Risk Management/171 Fraud tools 1.it.srt
8.1 kB
12 Access Control/118 Authentication users.en.srt
8.1 kB
18 Application Security - Configuration and Management/213 Isolating applications.it.srt
8.0 kB
08 Designing Secure Computer Networks/063 Subnetting IPv4.en.srt
8.0 kB
17 Disaster Recovery/203 CONFICKER CASE STUDY.en.srt
8.0 kB
09 Network administration/077 Wireshark - Introduction to network analysis.en.srt
8.0 kB
11 Operating Systems Security/103 EXERCISE OS boundaries.en.srt
7.9 kB
11 Operating Systems Security/105 Kernel Mode Code Signing.it.srt
7.9 kB
11 Operating Systems Security/104 Process isolation.it.srt
7.9 kB
10 Wireless Networks Security/091 802.11 WEP.en.srt
7.9 kB
15 Risk Management/169 SE with KALI BackTrack.it.srt
7.9 kB
20 Public Key Infrastructure/233 Public key infrastructure.it.srt
7.9 kB
19 Cryptography/223 Block cipher modes.en.srt
7.9 kB
11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.en.srt
7.9 kB
19 Cryptography/220 Data encryption standard.it.srt
7.9 kB
07 Computer Network Security/046 TCP Tunnelling over ICMP.en.srt
7.9 kB
15 Risk Management/172 Fraud tools 2.it.srt
7.9 kB
07 Computer Network Security/045 OSI MODEL 3 - Network layer.it.srt
7.8 kB
20 Public Key Infrastructure/238 Certificate life cycle.it.srt
7.8 kB
19 Cryptography/221 DES-X.en.srt
7.8 kB
07 Computer Network Security/043 Threats ARP Poisoning.en.srt
7.8 kB
06 Data Security/035 Integrity of data.it.srt
7.8 kB
15 Risk Management/161 Introduction to risk assessment.it.srt
7.8 kB
18 Application Security - Configuration and Management/211 Software restrictions policies.it.srt
7.7 kB
19 Cryptography/230 Hybrid Schemes.it.srt
7.7 kB
10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.en.srt
7.7 kB
15 Risk Management/155 Attack methods.en.srt
7.7 kB
16 Defence in Depth/176 DiD OS and LAN Layers.it.srt
7.7 kB
18 Application Security - Configuration and Management/208 MS Update.en.srt
7.7 kB
12 Access Control/122 LM Hash.en.srt
7.7 kB
20 Public Key Infrastructure/235 What will PKI allow you.en.srt
7.7 kB
17 Disaster Recovery/201 Collecting and analysing evidence.it.srt
7.6 kB
10 Wireless Networks Security/094 Threats of WIFI networks.it.srt
7.6 kB
04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.it.srt
7.6 kB
08 Designing Secure Computer Networks/066 IPv6 address notation.it.srt
7.5 kB
15 Risk Management/169 SE with KALI BackTrack.en.srt
7.5 kB
11 Operating Systems Security/113 Rootkits.it.srt
7.5 kB
15 Risk Management/171 Fraud tools 1.en.srt
7.5 kB
07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.it.srt
7.5 kB
06 Data Security/034 Objective 1 - Data security - Introduction.en.srt
7.5 kB
20 Public Key Infrastructure/233 Public key infrastructure.en.srt
7.5 kB
13 Windows Security/130 User Account Control.it.srt
7.4 kB
15 Risk Management/168 EXERCISE Social Engineering attacks.it.srt
7.4 kB
05 IT Security Trends/030 Online privacy.it.srt
7.4 kB
10 Wireless Networks Security/086 WIFI - working principles.it.srt
7.4 kB
19 Cryptography/229 Digital signature.it.srt
7.4 kB
20 Public Key Infrastructure/238 Certificate life cycle.en.srt
7.4 kB
16 Defence in Depth/192 Laws for administrators.it.srt
7.3 kB
08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.it.srt
7.3 kB
11 Operating Systems Security/104 Process isolation.en.srt
7.3 kB
07 Computer Network Security/045 OSI MODEL 3 - Network layer.en.srt
7.3 kB
18 Application Security - Configuration and Management/213 Isolating applications.en.srt
7.3 kB
19 Cryptography/220 Data encryption standard.en.srt
7.3 kB
15 Risk Management/172 Fraud tools 2.en.srt
7.3 kB
11 Operating Systems Security/115 EXERCISE Security evaluation.it.srt
7.3 kB
07 Computer Network Security/042 Threats MAC spoofing.it.srt
7.3 kB
16 Defence in Depth/176 DiD OS and LAN Layers.en.srt
7.3 kB
19 Cryptography/217 Symmetric and asymmetric ciphers.it.srt
7.3 kB
10 Wireless Networks Security/092 802.11I WPA.it.srt
7.2 kB
15 Risk Management/161 Introduction to risk assessment.en.srt
7.2 kB
06 Data Security/035 Integrity of data.en.srt
7.2 kB
19 Cryptography/230 Hybrid Schemes.en.srt
7.2 kB
20 Public Key Infrastructure/234 Implementing public key infrastructure.it.srt
7.1 kB
11 Operating Systems Security/105 Kernel Mode Code Signing.en.srt
7.1 kB
19 Cryptography/219 Block ciphers.it.srt
7.1 kB
17 Disaster Recovery/201 Collecting and analysing evidence.en.srt
7.1 kB
08 Designing Secure Computer Networks/066 IPv6 address notation.en.srt
7.1 kB
07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.it.srt
7.0 kB
04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.en.srt
7.0 kB
07 Computer Network Security/040 OSI MODEL 1 - Physical layer.it.srt
7.0 kB
08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.en.srt
7.0 kB
15 Risk Management/168 EXERCISE Social Engineering attacks.en.srt
7.0 kB
04 Popular IT Security Myths/021 Popular myths about IT security - origins.it.srt
7.0 kB
07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.en.srt
7.0 kB
10 Wireless Networks Security/085 WIFI security solutions - introduction.it.srt
7.0 kB
09 Network administration/079 Analyzing Captured data.it.srt
6.9 kB
13 Windows Security/130 User Account Control.en.srt
6.9 kB
18 Application Security - Configuration and Management/211 Software restrictions policies.en.srt
6.9 kB
19 Cryptography/217 Symmetric and asymmetric ciphers.en.srt
6.9 kB
11 Operating Systems Security/113 Rootkits.en.srt
6.9 kB
16 Defence in Depth/192 Laws for administrators.en.srt
6.9 kB
07 Computer Network Security/039 Network security - introduction.it.srt
6.9 kB
10 Wireless Networks Security/094 Threats of WIFI networks.en.srt
6.9 kB
05 IT Security Trends/030 Online privacy.en.srt
6.8 kB
19 Cryptography/229 Digital signature.en.srt
6.8 kB
02 Application Security/013 Program security assessment.it.srt
6.8 kB
19 Cryptography/218 Symmetric-key algorithms.it.srt
6.8 kB
15 Risk Management/157 Target scanning and enumeration techniques 1.it.srt
6.8 kB
04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.it.srt
6.8 kB
10 Wireless Networks Security/086 WIFI - working principles.en.srt
6.8 kB
07 Computer Network Security/042 Threats MAC spoofing.en.srt
6.8 kB
16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.it.srt
6.8 kB
16 Defence in Depth/175 How to use Defence in Depth model.it.srt
6.7 kB
10 Wireless Networks Security/092 802.11I WPA.en.srt
6.7 kB
09 Network administration/076 Why are firewalls and NDIS not enough.it.srt
6.7 kB
11 Operating Systems Security/115 EXERCISE Security evaluation.en.srt
6.7 kB
03 Introduction to Cyber Threats/018 Lets look a few years back.it.srt
6.7 kB
09 Network administration/079 Analyzing Captured data.en.srt
6.7 kB
03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.it.srt
6.7 kB
13 Windows Security/140 EXERCISE EFS.it.srt
6.7 kB
14 Security Policies/147 Why are security solutions fallible.it.srt
6.6 kB
07 Computer Network Security/040 OSI MODEL 1 - Physical layer.en.srt
6.6 kB
19 Cryptography/219 Block ciphers.en.srt
6.6 kB
20 Public Key Infrastructure/234 Implementing public key infrastructure.en.srt
6.6 kB
04 Popular IT Security Myths/021 Popular myths about IT security - origins.en.srt
6.6 kB
09 Network administration/076 Why are firewalls and NDIS not enough.en.srt
6.5 kB
17 Disaster Recovery/195 How to reduce losses.it.srt
6.5 kB
10 Wireless Networks Security/085 WIFI security solutions - introduction.en.srt
6.5 kB
15 Risk Management/163 DREAD Exploitability.it.srt
6.5 kB
07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.en.srt
6.5 kB
19 Cryptography/228 HASH functions.it.srt
6.5 kB
07 Computer Network Security/039 Network security - introduction.en.srt
6.5 kB
06 Data Security/038 EXERCISE Finding confidential data with search engines.it.srt
6.4 kB
15 Risk Management/157 Target scanning and enumeration techniques 1.en.srt
6.4 kB
04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.en.srt
6.4 kB
07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.it.srt
6.4 kB
16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.en.srt
6.3 kB
14 Security Policies/149 Introduction to threat modelling and classification.it.srt
6.3 kB
16 Defence in Depth/175 How to use Defence in Depth model.en.srt
6.3 kB
07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.it.srt
6.2 kB
03 Introduction to Cyber Threats/017 IT Prehistory.it.srt
6.2 kB
02 Application Security/013 Program security assessment.en.srt
6.2 kB
07 Computer Network Security/056 EXERCISE Application Layer Attacks.it.srt
6.2 kB
03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.en.srt
6.2 kB
13 Windows Security/140 EXERCISE EFS.en.srt
6.2 kB
19 Cryptography/218 Symmetric-key algorithms.en.srt
6.2 kB
12 Access Control/119 How secure is your password.it.srt
6.2 kB
19 Cryptography/228 HASH functions.en.srt
6.2 kB
19 Cryptography/226 RSA.it.srt
6.2 kB
03 Introduction to Cyber Threats/018 Lets look a few years back.en.srt
6.2 kB
03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.it.srt
6.2 kB
06 Data Security/037 Confidentiality of data.it.srt
6.1 kB
06 Data Security/038 EXERCISE Finding confidential data with search engines.en.srt
6.1 kB
14 Security Policies/147 Why are security solutions fallible.en.srt
6.1 kB
17 Disaster Recovery/195 How to reduce losses.en.srt
6.1 kB
14 Security Policies/151 STRIDE Spoofing identity.it.srt
6.1 kB
05 IT Security Trends/029 Fake identity.it.srt
6.1 kB
15 Risk Management/163 DREAD Exploitability.en.srt
6.1 kB
07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.en.srt
6.0 kB
07 Computer Network Security/056 EXERCISE Application Layer Attacks.en.srt
6.0 kB
19 Cryptography/222 Advanced encryption standards.it.srt
5.9 kB
03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.en.srt
5.9 kB
10 Wireless Networks Security/096 Client Attacks Evil twin.it.srt
5.9 kB
11 Operating Systems Security/101 Security boundaries.it.srt
5.9 kB
12 Access Control/119 How secure is your password.en.srt
5.8 kB
17 Disaster Recovery/199 Audit users and keep control accounts.it.srt
5.8 kB
07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.en.srt
5.8 kB
07 Computer Network Security/041 OSI MODEL 2 - Data link layer.it.srt
5.8 kB
19 Cryptography/226 RSA.en.srt
5.8 kB
14 Security Policies/149 Introduction to threat modelling and classification.en.srt
5.8 kB
03 Introduction to Cyber Threats/017 IT Prehistory.en.srt
5.8 kB
16 Defence in Depth/179 Automated attack targeting a service.it.srt
5.8 kB
05 IT Security Trends/029 Fake identity.en.srt
5.7 kB
10 Wireless Networks Security/088 Threats and risks.it.srt
5.7 kB
06 Data Security/037 Confidentiality of data.en.srt
5.7 kB
14 Security Policies/151 STRIDE Spoofing identity.en.srt
5.7 kB
15 Risk Management/162 DREAD Risk assessment model.it.srt
5.6 kB
14 Security Policies/148 Security policy issues.it.srt
5.6 kB
14 Security Policies/146 Security issues.it.srt
5.6 kB
19 Cryptography/222 Advanced encryption standards.en.srt
5.6 kB
13 Windows Security/138 BitLocker To Go Reader.it.srt
5.6 kB
14 Security Policies/152 STRIDE Tampering with Data.it.srt
5.5 kB
16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.it.srt
5.5 kB
12 Access Control/123 Cached Credentials.it.srt
5.5 kB
07 Computer Network Security/059 Modifying Transmitted Packets.it.srt
5.5 kB
11 Operating Systems Security/101 Security boundaries.en.srt
5.5 kB
11 Operating Systems Security/106 Java Virtual Machine and code access security.it.srt
5.5 kB
16 Defence in Depth/180 Automated user-targeting attack.it.srt
5.4 kB
24 BONUS Section/245 BONUS LECTURE Learn more and get to know our other courses.html
5.4 kB
10 Wireless Networks Security/096 Client Attacks Evil twin.en.srt
5.4 kB
16 Defence in Depth/179 Automated attack targeting a service.en.srt
5.4 kB
07 Computer Network Security/041 OSI MODEL 2 - Data link layer.en.srt
5.4 kB
17 Disaster Recovery/197 Threat discovery 1.it.srt
5.3 kB
17 Disaster Recovery/199 Audit users and keep control accounts.en.srt
5.3 kB
15 Risk Management/162 DREAD Risk assessment model.en.srt
5.3 kB
16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.en.srt
5.3 kB
10 Wireless Networks Security/088 Threats and risks.en.srt
5.2 kB
14 Security Policies/148 Security policy issues.en.srt
5.2 kB
10 Wireless Networks Security/089 Ineffective solutions.it.srt
5.2 kB
07 Computer Network Security/059 Modifying Transmitted Packets.en.srt
5.2 kB
13 Windows Security/138 BitLocker To Go Reader.en.srt
5.2 kB
12 Access Control/123 Cached Credentials.en.srt
5.2 kB
14 Security Policies/146 Security issues.en.srt
5.1 kB
15 Risk Management/166 Introduction to Social Engineering and rogue software.it.srt
5.1 kB
16 Defence in Depth/180 Automated user-targeting attack.en.srt
5.1 kB
14 Security Policies/152 STRIDE Tampering with Data.en.srt
5.1 kB
11 Operating Systems Security/106 Java Virtual Machine and code access security.en.srt
5.0 kB
16 Defence in Depth/190 Law 9.it.srt
4.9 kB
10 Wireless Networks Security/089 Ineffective solutions.en.srt
4.8 kB
15 Risk Management/166 Introduction to Social Engineering and rogue software.en.srt
4.8 kB
17 Disaster Recovery/196 Ensuring continous availability.it.srt
4.8 kB
14 Security Policies/153 STRIDE Denial of Service.it.srt
4.8 kB
14 Security Policies/145 Information security - level up.it.srt
4.7 kB
16 Defence in Depth/190 Law 9.en.srt
4.7 kB
17 Disaster Recovery/197 Threat discovery 1.en.srt
4.7 kB
05 IT Security Trends/026 Trends in IT Security.it.srt
4.6 kB
05 IT Security Trends/028 EXERCISE How much info can you gather.it.srt
4.6 kB
14 Security Policies/144 Information security.it.srt
4.6 kB
07 Computer Network Security/049 Threats Enumerating Remote Computers.it.srt
4.5 kB
14 Security Policies/150 Threat modelling - STRIDE.it.srt
4.5 kB
17 Disaster Recovery/196 Ensuring continous availability.en.srt
4.5 kB
07 Computer Network Security/052 OSI MODEL 5 - Session Layer.it.srt
4.5 kB
17 Disaster Recovery/202 Forensics example.it.srt
4.4 kB
17 Disaster Recovery/198 Threat discovery 2.it.srt
4.4 kB
14 Security Policies/145 Information security - level up.en.srt
4.4 kB
14 Security Policies/153 STRIDE Denial of Service.en.srt
4.3 kB
05 IT Security Trends/028 EXERCISE How much info can you gather.en.srt
4.3 kB
07 Computer Network Security/055 OSI MODEL 7 - Application Layer.it.srt
4.3 kB
05 IT Security Trends/026 Trends in IT Security.en.srt
4.3 kB
07 Computer Network Security/055 OSI MODEL 7 - Application Layer.en.srt
4.3 kB
14 Security Policies/143 What is security.it.srt
4.2 kB
14 Security Policies/150 Threat modelling - STRIDE.en.srt
4.2 kB
19 Cryptography/224 Stream Ciphers - RC4.it.srt
4.2 kB
14 Security Policies/144 Information security.en.srt
4.2 kB
05 IT Security Trends/031 Analyzing sniffing software.it.srt
4.2 kB
10 Wireless Networks Security/098 EXERCISE WPA attack.it.srt
4.2 kB
07 Computer Network Security/052 OSI MODEL 5 - Session Layer.en.srt
4.2 kB
17 Disaster Recovery/202 Forensics example.en.srt
4.1 kB
17 Disaster Recovery/200 High risk users.it.srt
4.1 kB
07 Computer Network Security/049 Threats Enumerating Remote Computers.en.srt
4.1 kB
17 Disaster Recovery/198 Threat discovery 2.en.srt
4.0 kB
15 Risk Management/158 Target scanning and enumeration techniques 2.it.srt
4.0 kB
07 Computer Network Security/057 Backtrack Attack Demonstration.it.srt
4.0 kB
14 Security Policies/143 What is security.en.srt
4.0 kB
19 Cryptography/224 Stream Ciphers - RC4.en.srt
4.0 kB
10 Wireless Networks Security/098 EXERCISE WPA attack.en.srt
4.0 kB
16 Defence in Depth/186 Law 5.it.srt
3.9 kB
05 IT Security Trends/027 The birth of technology society.it.srt
3.8 kB
07 Computer Network Security/057 Backtrack Attack Demonstration.en.srt
3.8 kB
05 IT Security Trends/031 Analyzing sniffing software.en.srt
3.8 kB
15 Risk Management/156 Local attacks.it.srt
3.8 kB
15 Risk Management/158 Target scanning and enumeration techniques 2.en.srt
3.8 kB
08 Designing Secure Computer Networks/064 Subnetting IPv6.it.srt
3.7 kB
17 Disaster Recovery/200 High risk users.en.srt
3.7 kB
10 Wireless Networks Security/087 Other wireless technologies.it.srt
3.7 kB
16 Defence in Depth/186 Law 5.en.srt
3.6 kB
08 Designing Secure Computer Networks/064 Subnetting IPv6.en.srt
3.6 kB
16 Defence in Depth/183 Law 2.it.srt
3.6 kB
05 IT Security Trends/027 The birth of technology society.en.srt
3.5 kB
07 Computer Network Security/060 Unencrypted protocols.it.srt
3.5 kB
01 Lets start/002 Foreword FAQ.html
3.5 kB
18 Application Security - Configuration and Management/207 Software updates.it.srt
3.4 kB
18 Application Security - Configuration and Management/209 System Center Configuration Manager.it.srt
3.4 kB
10 Wireless Networks Security/087 Other wireless technologies.en.srt
3.4 kB
15 Risk Management/156 Local attacks.en.srt
3.4 kB
07 Computer Network Security/060 Unencrypted protocols.en.srt
3.3 kB
16 Defence in Depth/183 Law 2.en.srt
3.3 kB
18 Application Security - Configuration and Management/209 System Center Configuration Manager.en.srt
3.2 kB
18 Application Security - Configuration and Management/207 Software updates.en.srt
3.2 kB
16 Defence in Depth/178 DiD Demonstration.it.srt
3.2 kB
07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.it.srt
3.1 kB
07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.en.srt
3.0 kB
15 Risk Management/170 Rogue Software.it.srt
2.9 kB
16 Defence in Depth/178 DiD Demonstration.en.srt
2.9 kB
20 Public Key Infrastructure/232 Introduction to cryptology.it.srt
2.9 kB
15 Risk Management/170 Rogue Software.en.srt
2.8 kB
20 Public Key Infrastructure/232 Introduction to cryptology.en.srt
2.7 kB
16 Defence in Depth/187 Law 6.it.srt
2.7 kB
08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.it.srt
2.7 kB
16 Defence in Depth/184 Law 3.it.srt
2.7 kB
16 Defence in Depth/184 Law 3.en.srt
2.5 kB
08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.en.srt
2.5 kB
16 Defence in Depth/187 Law 6.en.srt
2.5 kB
14 Security Policies/142 Security policies introduction.it.srt
2.4 kB
19 Cryptography/227 ELGAMAL.it.srt
2.4 kB
15 Risk Management/159 Passive scanning.it.srt
2.3 kB
12 Access Control/117 Authentication and authorisation - Introduction.it.srt
2.2 kB
19 Cryptography/227 ELGAMAL.en.srt
2.2 kB
16 Defence in Depth/185 Law 4.it.srt
2.2 kB
14 Security Policies/142 Security policies introduction.en.srt
2.2 kB
15 Risk Management/159 Passive scanning.en.srt
2.1 kB
12 Access Control/117 Authentication and authorisation - Introduction.en.srt
2.0 kB
16 Defence in Depth/185 Law 4.en.srt
2.0 kB
17 Disaster Recovery/194 Introduction to Disaster Recovery.it.srt
1.9 kB
16 Defence in Depth/189 Law 8.it.srt
1.8 kB
16 Defence in Depth/174 Introduction to Defence in Depth.it.srt
1.8 kB
16 Defence in Depth/189 Law 8.en.srt
1.8 kB
15 Risk Management/154 Introduction to Risk Management.it.srt
1.8 kB
13 Windows Security/133 PatchGuard.it.srt
1.8 kB
17 Disaster Recovery/194 Introduction to Disaster Recovery.en.srt
1.7 kB
16 Defence in Depth/174 Introduction to Defence in Depth.en.srt
1.7 kB
15 Risk Management/154 Introduction to Risk Management.en.srt
1.7 kB
13 Windows Security/133 PatchGuard.en.srt
1.6 kB
10 Wireless Networks Security/084 Wireless Networks.it.srt
1.5 kB
16 Defence in Depth/188 Law 7.it.srt
1.5 kB
13 Windows Security/129 Windows Security - what youll learn.it.srt
1.5 kB
04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.it.srt
1.5 kB
10 Wireless Networks Security/084 Wireless Networks.en.srt
1.4 kB
13 Windows Security/129 Windows Security - what youll learn.en.srt
1.4 kB
16 Defence in Depth/188 Law 7.en.srt
1.4 kB
09 Network administration/073 Introduction to Monitoring Transmitted Data.it.srt
1.4 kB
09 Network administration/073 Introduction to Monitoring Transmitted Data.en.srt
1.3 kB
04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.en.srt
1.3 kB
18 Application Security - Configuration and Management/205 Heres what youll learn in this module.it.srt
1.3 kB
02 Application Security/004 Why is this section here.html
1.2 kB
24 BONUS Section/246 Thank you.html
1.2 kB
01 Lets start/001 Welcome to the course.html
1.2 kB
18 Application Security - Configuration and Management/205 Heres what youll learn in this module.en.srt
1.2 kB
Read Me.txt
1.0 kB
18 Application Security - Configuration and Management/214 How to protect users without interrupting their work - notes for the examination.html
931 Bytes
20 Public Key Infrastructure/241 Public Key Infrastructure - Trust but verify - notes for the examination.html
923 Bytes
15 Risk Management/173 Social Engineering and Rogue Software - notes for the examination.html
916 Bytes
20 Public Key Infrastructure/240 Threat Modelling and Classification - notes for the examination.html
914 Bytes
19 Cryptography/231 Symmetric and Asymmetric Ciphers - notes for the examination.html
911 Bytes
02 Application Security/015 Program Security Assessment - notes for the examination.html
906 Bytes
16 Defence in Depth/181 The Defence in Depth Model - notes for the examination.html
905 Bytes
16 Defence in Depth/193 Immutable Laws of Security - notes for the examination.html
905 Bytes
15 Risk Management/160 Attack Methodologies - notes for the examination.html
899 Bytes
17 Disaster Recovery/204 How to reduce losses - notes for the examination.html
899 Bytes
02 Application Security/012 Application Attacks - notes for the examination.html
898 Bytes
15 Risk Management/165 Risk Assessment - notes for the examination.html
894 Bytes
16 Defence in Depth/191 Law 10.it.srt
865 Bytes
16 Defence in Depth/191 Law 10.en.srt
791 Bytes
02 Application Security/external-assets-links.txt
137 Bytes
[FreeAllCourse.Com].url
52 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!