TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
- Date: 2026-03-28
- Size: 819 MB
- Files: 45
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Introduction/1 -Introduction to Information Security Objectives.mp4
5.9 MB
~Get Your Files Here !/1 - Introduction/2 -Confidentiality.mp4
18 MB
~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4
25 MB
~Get Your Files Here !/1 - Introduction/4 -Availability.mp4
21 MB
~Get Your Files Here !/2 - Types of Security/1 -Introduction to Types of Security.mp4
4.1 MB
~Get Your Files Here !/2 - Types of Security/2 -ICT Security.mp4
21 MB
~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4
22 MB
~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4
37 MB
~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4
30 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/1 -Introduction to Governance, Risk Management and Compliance.mp4
4.8 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/2 -Common Risk Terms.mp4
16 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/3 -Risk Layers.mp4
12 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4
28 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4
35 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/6 -Risk Response.mp4
19 MB
~Get Your Files Here !/4 - Common Types of Malware/1 -Introduction to Common Types of Malware.mp4
6.6 MB
~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4
30 MB
~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4
32 MB
~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4
21 MB
~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4
33 MB
~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4
33 MB
~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4
24 MB
~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4
28 MB
~Get Your Files Here !/5 - Security Controls/1 -Introduction to Security Controls.mp4
3.8 MB
~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4
31 MB
~Get Your Files Here !/6 - OWASP Top 10/1 -Introduction to OWASP Top 10.mp4
12 MB
~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4
27 MB
~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4
27 MB
~Get Your Files Here !/6 - OWASP Top 10/2 -Broken Access Control.mp4
21 MB
~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4
26 MB
~Get Your Files Here !/6 - OWASP Top 10/4 -Injection.mp4
16 MB
~Get Your Files Here !/6 - OWASP Top 10/5 -Insecure Design.mp4
19 MB
~Get Your Files Here !/6 - OWASP Top 10/6 -Security Misconfiguration.mp4
19 MB
~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4
26 MB
~Get Your Files Here !/6 - OWASP Top 10/8 -Identification and Authentication Failures.mp4
19 MB
~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4
27 MB
~Get Your Files Here !/7 - Unix Commands/1 -Introduction to Unix Commands.mp4
6.3 MB
~Get Your Files Here !/7 - Unix Commands/2 -Terminal.mp4
8.9 MB
~Get Your Files Here !/7 - Unix Commands/3 -Print Working Directory (pwd).mp4
5.3 MB
~Get Your Files Here !/7 - Unix Commands/4 -List (ls).mp4
5.2 MB
~Get Your Files Here !/7 - Unix Commands/5 -Change Directory (cd).mp4
6.0 MB
~Get Your Files Here !/7 - Unix Commands/6 -Make Directory (mkdir).mp4
5.6 MB
~Get Your Files Here !/7 - Unix Commands/7 -Remove Directory (rmdir).mp4
4.8 MB
~Get Your Files Here !/Bonus Resources.txt
70 B