Torrent Info
Title CompTIA Security+ (SY0-601)
Category
Size 26.99GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 2.98KB
1 12.47KB
1.1 comptia-secplusy0601.zip 203.65MB
1. Cryptography Concepts.mp4 328.67MB
1. Cryptography Concepts.srt 42.87KB
1. Overview.mp4 101.41MB
1. Overview.srt 10.64KB
10 1.08MB
10. Authentication and Authorization.mp4 380.03MB
10. Authentication and Authorization.srt 49.51KB
10. Network Attacks - DNS Attacks.mp4 347.82MB
10. Network Attacks - DNS Attacks.srt 38.11KB
11 801.94KB
11. Authentication Methods.mp4 357.61MB
11. Authentication Methods.srt 44.03KB
11. Network Attacks - Layer 2 Attacks.mp4 320.23MB
11. Network Attacks - Layer 2 Attacks.srt 40.20KB
12 1.97MB
12. Additional Authentication Methods.mp4 183.73MB
12. Additional Authentication Methods.srt 24.38KB
12. Network Attacks - DoS and DDoS.mp4 217.17MB
12. Network Attacks - DoS and DDoS.srt 24.57KB
13 334.22KB
13. Biometrics.mp4 281.41MB
13. Biometrics.srt 34.51KB
13. Network Attacks - MiTM and MiTB.mp4 191.36MB
13. Network Attacks - MiTM and MiTB.srt 21.19KB
14 543.37KB
14. Authentication Protocols - PAP and CHAP.mp4 191.70MB
14. Authentication Protocols - PAP and CHAP.srt 25.73KB
14. Network Attacks - Wireless.mp4 354.99MB
14. Network Attacks - Wireless.srt 39.60KB
15 1.15MB
15. Authentication Protocols - EAP and 802.1X.mp4 249.77MB
15. Authentication Protocols - EAP and 802.1X.srt 29.43KB
15. Vulnerabilities.mp4 350.14MB
15. Vulnerabilities.srt 41.01KB
16 734.31KB
16. Authentication Protocols - RADIUS and TACACS.mp4 212.03MB
16. Authentication Protocols - RADIUS and TACACS.srt 28.25KB
16. Threat Intelligence - OSINT.mp4 204.14MB
16. Threat Intelligence - OSINT.srt 23.80KB
17 1.22MB
17. Authentication Protocols - Kerberos.mp4 186.67MB
17. Authentication Protocols - Kerberos.srt 22.80KB
17. Threat Intelligence - Threat Maps and Feeds.mp4 230.85MB
17. Threat Intelligence - Threat Maps and Feeds.srt 24.77KB
18 138.84KB
18. Access Control Schemes.mp4 371.86MB
18. Access Control Schemes.srt 48.23KB
18. Threat Intelligence Vulnerability Databases Feed.mp4 321.36MB
18. Threat Intelligence Vulnerability Databases Feed.srt 35.97KB
19 833.75KB
19. Account Management - Account Types.mp4 323.44MB
19. Account Management - Account Types.srt 44.21KB
19. Threat Actors and Vectors.mp4 379.47MB
19. Threat Actors and Vectors.srt 41.97KB
2 2.55KB
2. Encryption and Steganography.mp4 239.16MB
2. Encryption and Steganography.srt 27.94KB
2. Social Engineering Techniques.mp4 336.55MB
2. Social Engineering Techniques.srt 42.06KB
20 1.93MB
20. Account Management - Password Policies.mp4 226.45MB
20. Account Management - Password Policies.srt 28.29KB
21 1.58MB
21. Account Management - Account Policies.mp4 213.92MB
21. Account Management - Account Policies.srt 29.00KB
22 399.15KB
22. Application Security.mp4 304.31MB
22. Application Security.srt 38.63KB
23 1.48MB
23. Physical Security.mp4 407.18MB
23. Physical Security.srt 49.81KB
24 1.01MB
24. Wireless Security.mp4 407.48MB
24. Wireless Security.srt 54.00KB
25 526.23KB
25. Secure Data Destruction.mp4 280.94MB
25. Secure Data Destruction.srt 33.48KB
26 1.36MB
26. Host Security - Endpoint Protection.mp4 371.19MB
26. Host Security - Endpoint Protection.srt 47.39KB
27 1.62MB
27. Host Security - Hardening.mp4 386.92MB
27. Host Security - Hardening.srt 50.21KB
28 1.86MB
28. Mobile Device Deployment.mp4 345.42MB
28. Mobile Device Deployment.srt 38.45KB
29 21.86KB
29. Mobile Device Management and Enforcement.mp4 347.98MB
29. Mobile Device Management and Enforcement.srt 44.23KB
3 3.36KB
3. Hashing.mp4 315.35MB
3. Hashing.srt 37.32KB
3. Malware.mp4 345.19MB
3. Malware.srt 41.91KB
30 182.74KB
30. Mobile Device Connections.mp4 244.66MB
30. Mobile Device Connections.srt 32.24KB
31 592.11KB
31. Specialized Systems.mp4 309.19MB
31. Specialized Systems.srt 36.19KB
32 824.89KB
32. Network Security - Segmentation.mp4 353.49MB
32. Network Security - Segmentation.srt 42.61KB
33 750.00KB
33. Network Security - VPNs.mp4 316.61MB
33. Network Security - VPNs.srt 38.85KB
34 537.62KB
34. Network Security - Proxies and Load Balancing.mp4 277.96MB
34. Network Security - Proxies and Load Balancing.srt 33.16KB
35 1.45MB
35. Network Security - Port Security.mp4 28.04MB
35. Network Security - Port Security.srt 34.07KB
36 1.05MB
36. Network Security - Firewalls.mp4 250.42MB
36. Network Security - Firewalls.srt 32.67KB
37 514.36KB
37. Network Security - NIDS and NIPS.mp4 122.82MB
37. Network Security - NIDS and NIPS.srt 15.73KB
38 1.33MB
38. Virtualization.mp4 356.52MB
38. Virtualization.srt 44.46KB
39 576.34KB
39. Cloud Concepts.mp4 374.78MB
39. Cloud Concepts.srt 46.84KB
4 481.50KB
4. Password Attacks - Types.mp4 212.62MB
4. Password Attacks - Types.srt 24.56KB
4. Secure Protocols.mp4 432.87MB
4. Secure Protocols.srt 48.84KB
40 659.99KB
40. Cloud Services.mp4 288.09MB
40. Cloud Services.srt 37.89KB
41 1.77MB
41. Cloud Models.mp4 172.56MB
41. Cloud Models.srt 20.00KB
42 1.39MB
42. Computing Types.mp4 300.11MB
42. Computing Types.srt 33.86KB
43 663.80KB
43. Cloud Security Controls.mp4 292.36MB
43. Cloud Security Controls.srt 37.32KB
44 15.64KB
44. Hardware Redundancy.mp4 429.69MB
44. Hardware Redundancy.srt 52.79KB
45 831.82KB
45. Site Redundancy.mp4 242.15MB
45. Site Redundancy.srt 30.01KB
46 716.10KB
46. Non-persistence Concepts.mp4 331.50MB
46. Non-persistence Concepts.srt 42.25KB
47 1.69MB
47. Backup and Recovery.mp4 364.42MB
47. Backup and Recovery.srt 47.77KB
48 1.89MB
48. Network Reconnaissance and Discovery.mp4 278.17MB
48. Network Reconnaissance and Discovery.srt 33.98KB
49 1.64MB
49. Packet Capture and Replay.mp4 395.20MB
49. Packet Capture and Replay.srt 54.87KB
5 42.69KB
5. Password Attacks - Tools.mp4 236.17MB
5. Password Attacks - Tools.srt 30.34KB
5. Symmetric vs. Asymmetric Encryption.mp4 393.98MB
5. Symmetric vs. Asymmetric Encryption.srt 47.84KB
50 435.88KB
50. Vulnerability Scans.mp4 275.10MB
50. Vulnerability Scans.srt 31.53KB
51 1.50MB
51. SIEM and SOAR Systems.mp4 217.93MB
51. SIEM and SOAR Systems.srt 26.89KB
52 1.91MB
52. Pentesting Techniques.mp4 350.38MB
52. Pentesting Techniques.srt 43.53KB
53 1.04MB
53. Pentesting Exercise Types.mp4 268.33MB
53. Pentesting Exercise Types.srt 31.57KB
54 603.94KB
54. Digital Forensics Concepts.mp4 375.28MB
54. Digital Forensics Concepts.srt 42.92KB
55 1.06MB
55. Investigational Data Sources.mp4 388.10MB
55. Investigational Data Sources.srt 48.22KB
56 1.83MB
56. Incident Response Process.mp4 228.02MB
56. Incident Response Process.srt 28.35KB
57 39.68KB
57. Incident Response Plans.mp4 224.57MB
57. Incident Response Plans.srt 27.69KB
58 918.91KB
58. Attack Frameworks.mp4 238.02MB
58. Attack Frameworks.srt 29.98KB
59 284.95KB
59. Security Controls.mp4 307.30MB
59. Security Controls.srt 40.18KB
6 820.58KB
6. Application Attacks - Injections.mp4 289.57MB
6. Application Attacks - Injections.srt 39.15KB
6. PKI Concepts.mp4 385.22MB
6. PKI Concepts.srt 47.81KB
60 1.67MB
60. Regulations, Standards and Frameworks.mp4 397.96MB
60. Regulations, Standards and Frameworks.srt 56.16KB
61 1.50MB
61. Spotlight on General Data Protection Regulation.mp4 350.64MB
61. Spotlight on General Data Protection Regulation.srt 46.87KB
62 1.58MB
62. Organizational Security Policies - Personnel.mp4 368.07MB
62. Organizational Security Policies - Personnel.srt 52.78KB
63 232.60KB
63. Organizational Security Policies - 3rd Party Risk.mp4 339.27MB
63. Organizational Security Policies - 3rd Party Risk.srt 49.65KB
64 483.79KB
64. Organizational Security Policies - Data.mp4 260.50MB
64. Organizational Security Policies - Data.srt 38.66KB
65 1.34MB
65. Organizational Security Policies - Other Areas.mp4 214.50MB
65. Organizational Security Policies - Other Areas.srt 32.19KB
66 1.85MB
66. Risk Management Concepts - Vocabulary.mp4 249.53MB
66. Risk Management Concepts - Vocabulary.srt 32.94KB
67 855.55KB
67. Risk Management Concepts - Types & Strategies.mp4 376.85MB
67. Risk Management Concepts - Types & Strategies.srt 51.48KB
68 1.98MB
68. Risk Management Concepts - Risk Analysis.mp4 313.98MB
68. Risk Management Concepts - Risk Analysis.srt 41.03KB
69 1.83MB
69. Risk Management Concepts Business Impact Analysis.mp4 390.13MB
69. Risk Management Concepts Business Impact Analysis.srt 56.15KB
7 23.81KB
7. Application Attacks - System Resources.mp4 337.47MB
7. Application Attacks - System Resources.srt 40.60KB
7. Certificates.mp4 332.95MB
7. Certificates.srt 36.97KB
70 1.15MB
70. Privacy and Data Sensitivity Breaches & Data Types.mp4 282.96MB
70. Privacy and Data Sensitivity Breaches & Data Types.srt 39.14KB
71 1.98MB
71. Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 288.50MB
71. Privacy, Data Sensitivity - Privacy Enhancing Tech.srt 39.14KB
72 960.96KB
72. Privacy, Data Sensitivity, Roles, Responsibilities.mp4 227.06MB
72. Privacy, Data Sensitivity, Roles, Responsibilities.srt 37.58KB
73 1.55MB
73. Privacy and Data Sensitivity - Other Areas.mp4 271.72MB
73. Privacy and Data Sensitivity - Other Areas.srt 29.98KB
74 1.43MB
75 66.79KB
76 853.99KB
77 1.50MB
78 82.10KB
79 1.38MB
8 1.87MB
8. Application Attacks - XSS and XSRF.mp4 185.22MB
8. Application Attacks - XSS and XSRF.srt 24.42KB
8. Keys.mp4 398.91MB
8. Keys.srt 46.54KB
80 1.97MB
81 776.11KB
82 1.86MB
83 358.56KB
84 304.12KB
85 650.44KB
86 1.33MB
87 796.68KB
88 280.21KB
89 1.44MB
9 1.90MB
9. Application Attacks - Replay Attacks.mp4 205.24MB
9. Application Attacks - Replay Attacks.srt 24.27KB
9. IPSec.mp4 379.67MB
9. IPSec.srt 43.89KB
90 1.18MB
91 607.39KB
TutsNode.net.txt 63B
Distribution statistics by country
South Africa (ZA) 4
Russia (RU) 2
Sweden (SE) 1
Poland (PL) 1
Panama (PA) 1
Bahrain (BH) 1
Netherlands (NL) 1
France (FR) 1
Mexico (MX) 1
Israel (IL) 1
Bulgaria (BG) 1
Saudi Arabia (SA) 1
Total 16
IP List List of IP addresses which were distributed this torrent