TorBT - Torrents and Magnet Links Search Engine

[ DevCourseWeb.com ] Udemy - ITS-102 - Information Technology Specialist Network Security

File Name
Size
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.mp4
24 MB
~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.srt
4.7 kB
~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.mp4
17 MB
~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.srt
6.4 kB
~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.mp4
30 MB
~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.srt
5.4 kB
~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.mp4
40 MB
~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.srt
7.1 kB
~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.mp4
65 MB
~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.srt
11 kB
~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.mp4
43 MB
~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.srt
4.0 kB
~Get Your Files Here !/1. Defense in Depth/15. Backups.mp4
44 MB
~Get Your Files Here !/1. Defense in Depth/15. Backups.srt
11 kB
~Get Your Files Here !/1. Defense in Depth/16. Quiz.html
209 B
~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.mp4
28 MB
~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.srt
10 kB
~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.mp4
36 MB
~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.srt
6.5 kB
~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.mp4
30 MB
~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.srt
6.9 kB
~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.mp4
24 MB
~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.srt
6.1 kB
~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.mp4
22 MB
~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.srt
6.3 kB
~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.mp4
32 MB
~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.srt
6.0 kB
~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.mp4
153 MB
~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.srt
8.4 kB
~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.mp4
23 MB
~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.srt
6.4 kB
~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.mp4
90 MB
~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.srt
14 kB
~Get Your Files Here !/2. Operating System Security/10. VPNs.mp4
56 MB
~Get Your Files Here !/2. Operating System Security/11. Quiz.html
209 B
~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.mp4
33 MB
~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.srt
6.0 kB
~Get Your Files Here !/2. Operating System Security/3. Authentication.mp4
23 MB
~Get Your Files Here !/2. Operating System Security/3. Authentication.srt
6.4 kB
~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.mp4
18 MB
~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.srt
4.6 kB
~Get Your Files Here !/2. Operating System Security/5. MFA.mp4
52 MB
~Get Your Files Here !/2. Operating System Security/5. MFA.srt
9.4 kB
~Get Your Files Here !/2. Operating System Security/6. Audits and logs.mp4
37 MB
~Get Your Files Here !/2. Operating System Security/6. Audits and logs.srt
8.5 kB
~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.mp4
22 MB
~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.srt
7.9 kB
~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.mp4
40 MB
~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.srt
8.8 kB
~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.mp4
37 MB
~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.srt
6.1 kB
~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.mp4
46 MB
~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.srt
9.2 kB
~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.mp4
64 MB
~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.srt
8.9 kB
~Get Your Files Here !/Bonus Resources.txt
386 B