Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
2.98KB |
1 |
12.47KB |
1.1 comptia-secplusy0601.zip |
203.65MB |
1. Cryptography Concepts.mp4 |
328.67MB |
1. Cryptography Concepts.srt |
42.87KB |
1. Overview.mp4 |
101.41MB |
1. Overview.srt |
10.64KB |
10 |
1.08MB |
10. Authentication and Authorization.mp4 |
380.03MB |
10. Authentication and Authorization.srt |
49.51KB |
10. Network Attacks - DNS Attacks.mp4 |
347.82MB |
10. Network Attacks - DNS Attacks.srt |
38.11KB |
11 |
801.94KB |
11. Authentication Methods.mp4 |
357.61MB |
11. Authentication Methods.srt |
44.03KB |
11. Network Attacks - Layer 2 Attacks.mp4 |
320.23MB |
11. Network Attacks - Layer 2 Attacks.srt |
40.20KB |
12 |
1.97MB |
12. Additional Authentication Methods.mp4 |
183.73MB |
12. Additional Authentication Methods.srt |
24.38KB |
12. Network Attacks - DoS and DDoS.mp4 |
217.17MB |
12. Network Attacks - DoS and DDoS.srt |
24.57KB |
13 |
334.22KB |
13. Biometrics.mp4 |
281.41MB |
13. Biometrics.srt |
34.51KB |
13. Network Attacks - MiTM and MiTB.mp4 |
191.36MB |
13. Network Attacks - MiTM and MiTB.srt |
21.19KB |
14 |
543.37KB |
14. Authentication Protocols - PAP and CHAP.mp4 |
191.70MB |
14. Authentication Protocols - PAP and CHAP.srt |
25.73KB |
14. Network Attacks - Wireless.mp4 |
354.99MB |
14. Network Attacks - Wireless.srt |
39.60KB |
15 |
1.15MB |
15. Authentication Protocols - EAP and 802.1X.mp4 |
249.77MB |
15. Authentication Protocols - EAP and 802.1X.srt |
29.43KB |
15. Vulnerabilities.mp4 |
350.14MB |
15. Vulnerabilities.srt |
41.01KB |
16 |
734.31KB |
16. Authentication Protocols - RADIUS and TACACS.mp4 |
212.03MB |
16. Authentication Protocols - RADIUS and TACACS.srt |
28.25KB |
16. Threat Intelligence - OSINT.mp4 |
204.14MB |
16. Threat Intelligence - OSINT.srt |
23.80KB |
17 |
1.22MB |
17. Authentication Protocols - Kerberos.mp4 |
186.67MB |
17. Authentication Protocols - Kerberos.srt |
22.80KB |
17. Threat Intelligence - Threat Maps and Feeds.mp4 |
230.85MB |
17. Threat Intelligence - Threat Maps and Feeds.srt |
24.77KB |
18 |
138.84KB |
18. Access Control Schemes.mp4 |
371.86MB |
18. Access Control Schemes.srt |
48.23KB |
18. Threat Intelligence Vulnerability Databases Feed.mp4 |
321.36MB |
18. Threat Intelligence Vulnerability Databases Feed.srt |
35.97KB |
19 |
833.75KB |
19. Account Management - Account Types.mp4 |
323.44MB |
19. Account Management - Account Types.srt |
44.21KB |
19. Threat Actors and Vectors.mp4 |
379.47MB |
19. Threat Actors and Vectors.srt |
41.97KB |
2 |
2.55KB |
2. Encryption and Steganography.mp4 |
239.16MB |
2. Encryption and Steganography.srt |
27.94KB |
2. Social Engineering Techniques.mp4 |
336.55MB |
2. Social Engineering Techniques.srt |
42.06KB |
20 |
1.93MB |
20. Account Management - Password Policies.mp4 |
226.45MB |
20. Account Management - Password Policies.srt |
28.29KB |
21 |
1.58MB |
21. Account Management - Account Policies.mp4 |
213.92MB |
21. Account Management - Account Policies.srt |
29.00KB |
22 |
399.15KB |
22. Application Security.mp4 |
304.31MB |
22. Application Security.srt |
38.63KB |
23 |
1.48MB |
23. Physical Security.mp4 |
407.18MB |
23. Physical Security.srt |
49.81KB |
24 |
1.01MB |
24. Wireless Security.mp4 |
407.48MB |
24. Wireless Security.srt |
54.00KB |
25 |
526.23KB |
25. Secure Data Destruction.mp4 |
280.94MB |
25. Secure Data Destruction.srt |
33.48KB |
26 |
1.36MB |
26. Host Security - Endpoint Protection.mp4 |
371.19MB |
26. Host Security - Endpoint Protection.srt |
47.39KB |
27 |
1.62MB |
27. Host Security - Hardening.mp4 |
386.92MB |
27. Host Security - Hardening.srt |
50.21KB |
28 |
1.86MB |
28. Mobile Device Deployment.mp4 |
345.42MB |
28. Mobile Device Deployment.srt |
38.45KB |
29 |
21.86KB |
29. Mobile Device Management and Enforcement.mp4 |
347.98MB |
29. Mobile Device Management and Enforcement.srt |
44.23KB |
3 |
3.36KB |
3. Hashing.mp4 |
315.35MB |
3. Hashing.srt |
37.32KB |
3. Malware.mp4 |
345.19MB |
3. Malware.srt |
41.91KB |
30 |
182.74KB |
30. Mobile Device Connections.mp4 |
244.66MB |
30. Mobile Device Connections.srt |
32.24KB |
31 |
592.11KB |
31. Specialized Systems.mp4 |
309.19MB |
31. Specialized Systems.srt |
36.19KB |
32 |
824.89KB |
32. Network Security - Segmentation.mp4 |
353.49MB |
32. Network Security - Segmentation.srt |
42.61KB |
33 |
750.00KB |
33. Network Security - VPNs.mp4 |
316.61MB |
33. Network Security - VPNs.srt |
38.85KB |
34 |
537.62KB |
34. Network Security - Proxies and Load Balancing.mp4 |
277.96MB |
34. Network Security - Proxies and Load Balancing.srt |
33.16KB |
35 |
1.45MB |
35. Network Security - Port Security.mp4 |
28.04MB |
35. Network Security - Port Security.srt |
34.07KB |
36 |
1.05MB |
36. Network Security - Firewalls.mp4 |
250.42MB |
36. Network Security - Firewalls.srt |
32.67KB |
37 |
514.36KB |
37. Network Security - NIDS and NIPS.mp4 |
122.82MB |
37. Network Security - NIDS and NIPS.srt |
15.73KB |
38 |
1.33MB |
38. Virtualization.mp4 |
356.52MB |
38. Virtualization.srt |
44.46KB |
39 |
576.34KB |
39. Cloud Concepts.mp4 |
374.78MB |
39. Cloud Concepts.srt |
46.84KB |
4 |
481.50KB |
4. Password Attacks - Types.mp4 |
212.62MB |
4. Password Attacks - Types.srt |
24.56KB |
4. Secure Protocols.mp4 |
432.87MB |
4. Secure Protocols.srt |
48.84KB |
40 |
659.99KB |
40. Cloud Services.mp4 |
288.09MB |
40. Cloud Services.srt |
37.89KB |
41 |
1.77MB |
41. Cloud Models.mp4 |
172.56MB |
41. Cloud Models.srt |
20.00KB |
42 |
1.39MB |
42. Computing Types.mp4 |
300.11MB |
42. Computing Types.srt |
33.86KB |
43 |
663.80KB |
43. Cloud Security Controls.mp4 |
292.36MB |
43. Cloud Security Controls.srt |
37.32KB |
44 |
15.64KB |
44. Hardware Redundancy.mp4 |
429.69MB |
44. Hardware Redundancy.srt |
52.79KB |
45 |
831.82KB |
45. Site Redundancy.mp4 |
242.15MB |
45. Site Redundancy.srt |
30.01KB |
46 |
716.10KB |
46. Non-persistence Concepts.mp4 |
331.50MB |
46. Non-persistence Concepts.srt |
42.25KB |
47 |
1.69MB |
47. Backup and Recovery.mp4 |
364.42MB |
47. Backup and Recovery.srt |
47.77KB |
48 |
1.89MB |
48. Network Reconnaissance and Discovery.mp4 |
278.17MB |
48. Network Reconnaissance and Discovery.srt |
33.98KB |
49 |
1.64MB |
49. Packet Capture and Replay.mp4 |
395.20MB |
49. Packet Capture and Replay.srt |
54.87KB |
5 |
42.69KB |
5. Password Attacks - Tools.mp4 |
236.17MB |
5. Password Attacks - Tools.srt |
30.34KB |
5. Symmetric vs. Asymmetric Encryption.mp4 |
393.98MB |
5. Symmetric vs. Asymmetric Encryption.srt |
47.84KB |
50 |
435.88KB |
50. Vulnerability Scans.mp4 |
275.10MB |
50. Vulnerability Scans.srt |
31.53KB |
51 |
1.50MB |
51. SIEM and SOAR Systems.mp4 |
217.93MB |
51. SIEM and SOAR Systems.srt |
26.89KB |
52 |
1.91MB |
52. Pentesting Techniques.mp4 |
350.38MB |
52. Pentesting Techniques.srt |
43.53KB |
53 |
1.04MB |
53. Pentesting Exercise Types.mp4 |
268.33MB |
53. Pentesting Exercise Types.srt |
31.57KB |
54 |
603.94KB |
54. Digital Forensics Concepts.mp4 |
375.28MB |
54. Digital Forensics Concepts.srt |
42.92KB |
55 |
1.06MB |
55. Investigational Data Sources.mp4 |
388.10MB |
55. Investigational Data Sources.srt |
48.22KB |
56 |
1.83MB |
56. Incident Response Process.mp4 |
228.02MB |
56. Incident Response Process.srt |
28.35KB |
57 |
39.68KB |
57. Incident Response Plans.mp4 |
224.57MB |
57. Incident Response Plans.srt |
27.69KB |
58 |
918.91KB |
58. Attack Frameworks.mp4 |
238.02MB |
58. Attack Frameworks.srt |
29.98KB |
59 |
284.95KB |
59. Security Controls.mp4 |
307.30MB |
59. Security Controls.srt |
40.18KB |
6 |
820.58KB |
6. Application Attacks - Injections.mp4 |
289.57MB |
6. Application Attacks - Injections.srt |
39.15KB |
6. PKI Concepts.mp4 |
385.22MB |
6. PKI Concepts.srt |
47.81KB |
60 |
1.67MB |
60. Regulations, Standards and Frameworks.mp4 |
397.96MB |
60. Regulations, Standards and Frameworks.srt |
56.16KB |
61 |
1.50MB |
61. Spotlight on General Data Protection Regulation.mp4 |
350.64MB |
61. Spotlight on General Data Protection Regulation.srt |
46.87KB |
62 |
1.58MB |
62. Organizational Security Policies - Personnel.mp4 |
368.07MB |
62. Organizational Security Policies - Personnel.srt |
52.78KB |
63 |
232.60KB |
63. Organizational Security Policies - 3rd Party Risk.mp4 |
339.27MB |
63. Organizational Security Policies - 3rd Party Risk.srt |
49.65KB |
64 |
483.79KB |
64. Organizational Security Policies - Data.mp4 |
260.50MB |
64. Organizational Security Policies - Data.srt |
38.66KB |
65 |
1.34MB |
65. Organizational Security Policies - Other Areas.mp4 |
214.50MB |
65. Organizational Security Policies - Other Areas.srt |
32.19KB |
66 |
1.85MB |
66. Risk Management Concepts - Vocabulary.mp4 |
249.53MB |
66. Risk Management Concepts - Vocabulary.srt |
32.94KB |
67 |
855.55KB |
67. Risk Management Concepts - Types & Strategies.mp4 |
376.85MB |
67. Risk Management Concepts - Types & Strategies.srt |
51.48KB |
68 |
1.98MB |
68. Risk Management Concepts - Risk Analysis.mp4 |
313.98MB |
68. Risk Management Concepts - Risk Analysis.srt |
41.03KB |
69 |
1.83MB |
69. Risk Management Concepts Business Impact Analysis.mp4 |
390.13MB |
69. Risk Management Concepts Business Impact Analysis.srt |
56.15KB |
7 |
23.81KB |
7. Application Attacks - System Resources.mp4 |
337.47MB |
7. Application Attacks - System Resources.srt |
40.60KB |
7. Certificates.mp4 |
332.95MB |
7. Certificates.srt |
36.97KB |
70 |
1.15MB |
70. Privacy and Data Sensitivity Breaches & Data Types.mp4 |
282.96MB |
70. Privacy and Data Sensitivity Breaches & Data Types.srt |
39.14KB |
71 |
1.98MB |
71. Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 |
288.50MB |
71. Privacy, Data Sensitivity - Privacy Enhancing Tech.srt |
39.14KB |
72 |
960.96KB |
72. Privacy, Data Sensitivity, Roles, Responsibilities.mp4 |
227.06MB |
72. Privacy, Data Sensitivity, Roles, Responsibilities.srt |
37.58KB |
73 |
1.55MB |
73. Privacy and Data Sensitivity - Other Areas.mp4 |
271.72MB |
73. Privacy and Data Sensitivity - Other Areas.srt |
29.98KB |
74 |
1.43MB |
75 |
66.79KB |
76 |
853.99KB |
77 |
1.50MB |
78 |
82.10KB |
79 |
1.38MB |
8 |
1.87MB |
8. Application Attacks - XSS and XSRF.mp4 |
185.22MB |
8. Application Attacks - XSS and XSRF.srt |
24.42KB |
8. Keys.mp4 |
398.91MB |
8. Keys.srt |
46.54KB |
80 |
1.97MB |
81 |
776.11KB |
82 |
1.86MB |
83 |
358.56KB |
84 |
304.12KB |
85 |
650.44KB |
86 |
1.33MB |
87 |
796.68KB |
88 |
280.21KB |
89 |
1.44MB |
9 |
1.90MB |
9. Application Attacks - Replay Attacks.mp4 |
205.24MB |
9. Application Attacks - Replay Attacks.srt |
24.27KB |
9. IPSec.mp4 |
379.67MB |
9. IPSec.srt |
43.89KB |
90 |
1.18MB |
91 |
607.39KB |
TutsNode.net.txt |
63B |