Download Name | Age | Files | Size | SE | LE |
---|---|---|---|---|---|
[FreeCoursesOnline.Us] CBT Nuggets - comptia-security-plus-sy0-501 | 1 year | 90 | 4.37 GB | 10 | 2 |
[FreeCoursesOnline.Us] CBT Nuggets - ansible-essentials | 1 year | 20 | 654 MB | 10 | 0 |
[FreeCoursesOnline.Us] Linkedin - Python Projects | 1 year | 38 | 766 MB | 8 | 0 |
[FreeCoursesOnline.Us] CBT Nuggets - it-expertise-supporting-switching-networks | 1 year | 24 | 1.17 GB | 8 | 0 |
[FreeCoursesOnline.Us] Lynda - Office 365 for Administrators - Supporting Users Part 2 | 1 year | 70 | 340 MB | 7 | 0 |
[FreeCoursesOnline.Us] Pluralsight - react-styling-components | 1 year | 68 | 234 MB | 7 | 0 |
[FreeCoursesOnline.Us] Lynda - Building Angular and ASP.NET Core Apps with Authentication | 1 year | 104 | 698 MB | 7 | 0 |
[FreeCoursesOnline.Us] Django-3-Building-Online-Shop | 1 year | 21 | 187 MB | 6 | 0 |
[FreeCoursesOnline.Us] Laracasts - solid-principles-in-php | 1 year | 8 | 115 MB | 6 | 0 |
[FreeCoursesOnline.Us] Lynda - UX Foundations - Prototyping | 1 year | 42 | 476 MB | 6 | 0 |
25.5 MB | 001 Welcome to Security+.mp4 |
89 MB | 002 Infrastructure Security Devices.mp4 |
38.7 MB | 003 Application and Traffic Analysis .mp4 |
51.9 MB | 004 Network Segmentation and Separation with VLANs.mp4 |
59.9 MB | 005 ACL Case Study.mp4 |
75.3 MB | 006 Design Considerations.mp4 |
45.7 MB | 007 NAT and PAT Case Study.mp4 |
58 MB | 008 Firewall and Switch Protection Mechanisms.mp4 |
52.7 MB | 009 Virtualization Overview.mp4 |
68.3 MB | 010 IPsec_ Protocols_ and Well-known Ports.mp4 |
60.4 MB | 011 ICMP and a Few More Protocols.mp4 |
95 MB | 012 Security for WiFi.mp4 |
92.5 MB | 013 Risk Overview.mp4 |
68.9 MB | 014 Risk Calculation.mp4 |
42 MB | 015 Attack Vectors_ Risk Management_ and Recovery.mp4 |
39.9 MB | 016 Third-Party Risk from Integration.mp4 |
59 MB | 017 Change Management and Account Auditing.mp4 |
40.9 MB | 018 Data Loss Prevention (DLP).mp4 |
73.1 MB | 019 Forensics.mp4 |
43.5 MB | 020 Incident Response Concepts.mp4 |
54.4 MB | 021 Security Awareness_ RBAC_ and Data Labeling .mp4 |
54.3 MB | 022 Passwords_ Best Practices_ and Standards.mp4 |
39.8 MB | 023 Environmental Controls.mp4 |
48 MB | 024 Physical Security.mp4 |
65.1 MB | 025 Business Continuity.mp4 |
67.2 MB | 026 Fault Tolerance.mp4 |
50 MB | 027 Controls for Confidentiality .mp4 |
68.8 MB | 028 Tools and Controls for Data Integrity.mp4 |
20.9 MB | 029 Availability and Safety.mp4 |
43.3 MB | 030 Malware_ Adware - Spyware.mp4 |
68.8 MB | 031 Trojans_ Backdoors_ and More Malware.mp4 |
72.2 MB | 032 Attack Types MITM - Spear Fishing.mp4 |
55.1 MB | 033 Attack Types_ Xmas - Client Side.mp4 |
51 MB | 034 Password Attacks and Watering Holes.mp4 |
48.9 MB | 035 Social Engineering Threats.mp4 |
43.1 MB | 036 Vishing and Why Social Engineering Works.mp4 |
55.8 MB | 037 Wireless Attacks.mp4 |
64.6 MB | 038 Cross-site and Injection Attacks.mp4 |
46.8 MB | 039 Application Attacks.mp4 |
70.6 MB | 040 Monitoring and Device Hardening.mp4 |
38.7 MB | 041 Baselines_ Detection_ and Reporting.mp4 |
75.2 MB | 042 Analyzers and Scanners.mp4 |
58.1 MB | 043 Discovering and Assessing Threats.mp4 |
48.8 MB | 044 Penetration Testing.mp4 |
39.7 MB | 045 Techniques for Securing Apps.mp4 |
56.1 MB | 046 Application Security Controls.mp4 |
70.6 MB | 047 Mobile Device Security Overview.mp4 |
43 MB | 048 Host Security.mp4 |
46.4 MB | 049 Hardware and Virtualization Security.mp4 |
40.1 MB | 050 Data Security.mp4 |
39.5 MB | 051 Securing Data with H_.null._ Controls_ and Policy.mp4 |
54.4 MB | 052 Security in Static Environments.mp4 |
36.9 MB | 053 AAA Concepts.mp4 |
68.7 MB | 054 Authentication Protocols and Services.mp4 |
51.2 MB | 055 Multifactor Authentication.mp4 |
71.7 MB | 056 Authentication Controls.mp4 |
68.9 MB | 057 Controlling Access via Authorization.mp4 |
76.8 MB | 058 Account Management.mp4 |
69.6 MB | 059 Symmetric and Asymmetric Encryption.mp4 |
81.8 MB | 060 Crypto Key Management.mp4 |
72.2 MB | 061 Hashing and Encryption Protocols.mp4 |
63 MB | 062 Comparing Cryptography Algorithms.mp4 |
55.2 MB | 063 PKI Overview.mp4 |
37.7 MB | 064 Certificate Warnings and Trust Models.mp4 |
39.2 MB | 065 Layered Security Case Study.mp4 |
15.7 MB | 066 Attack Types and Vectors.mp4 |
20.2 MB | 067 Threat Actor Types and Ethics.mp4 |
36.6 MB | 068 Reconnaissance Information Gathering Concepts.mp4 |
22.4 MB | 069 Hacking Vocabulary and Terms.mp4 |
34 MB | 070 Malware Concepts.mp4 |
13.7 MB | 071 Network Scanning Overview.mp4 |
37.3 MB | 072 Trojans.mp4 |
38.8 MB | 073 Port Security.mp4 |
32.7 MB | 074 Scanning Methodologies.mp4 |
43.5 MB | 075 Sniffing Overview.mp4 |
29.5 MB | 076 Vulnerability Scanning.mp4 |
50.9 MB | 077 Social Engineering Overview.mp4 |
34.2 MB | 078 System Hacking Stages and Goals.mp4 |
48.4 MB | 079 Buffer Overflow.mp4 |
36.2 MB | 080 OWASP BWAP.mp4 |
41.3 MB | 081 Honeypots and Honeynets.mp4 |
49.8 MB | 082 Centralized Identity Management.mp4 |
63.8 MB | 083 SSO_ Kerberos_ and Security Threats.mp4 |
44.2 MB | 084 Incident Response.mp4 |
37.5 MB | 085 Penetration Testing Legally.mp4 |
75.9 MB | 086 Case Study #1.mp4 |
138 B | [FreeCoursesOnline.Us].txt |
123 B | [FreeCoursesOnline.Us].url |
75 B | [FreeTutorials.Us].txt |
119 B | [FreeTutorials.Us].url |