File List
-
0 - Overview.mp4 93.65 MB
1.11 - Determining Types of Malware.mp4 607.69 MB
1.12 - Determining Types of Malware Part 2.mp4 750.68 MB
1.2 - Types of Attacks.mp4 354.03 MB
1.22 - Types of Attacks Part 2.mp4 686.49 MB
1.23 - Types of Attacks Part 3.mp4 819.49 MB
1.24 - Types of Attacks Part 4.mp4 570.11 MB
1.3 - Threat Vector Types and Attributes.mp4 541.39 MB
1.4 - Penetration Testing Concepts.mp4 634.16 MB
1.5 - Vulnerability Scanning Concepts.mp4 688.49 MB
1.61 - Impact of Various Vulnerabilities.mp4 617.12 MB
1.62 - Impact of Various Vulnerabilities Part 2.mp4 594.32 MB
2.11 - Hardware Software Organizational Security.mp4 658 MB
2.12 - Hardware Software Organizational Security Part 2.mp4 509.33 MB
2.13 - Hardware Software Organizational Security Part 3.mp4 549.04 MB
2.14 - Hardware Software Organizational Security Part 4.mp4 659.83 MB
2.21 - Security Posture Assessment.mp4 436.71 MB
2.22 - Security Posture Assessment Part 2.mp4 457.19 MB
2.23 - Security Posture Assessment Part 3.mp4 418.8 MB
2.24 - Security Posture Assessment Part 4.mp4 593.97 MB
2.31 - Troubleshoot Common Security Issues.mp4 740.03 MB
2.32 - Troubleshoot Common Security Issues Part 2.mp4 512.63 MB
2.41 - Analyze and Interpret Outputs.mp4 381.37 MB
2.42 - Analyze and Interpret Outputs Part 2.mp4 505.02 MB
2.5 - Deploy Mobile Security.mp4 556.35 MB
2.6 - Implement Secure Protocols.mp4 599.66 MB
3.1 - Best Practices and Secure Config Guides.mp4 531.87 MB
3.2 - Secure Network Architecture Concepts.mp4 629.09 MB
3.3 - Secure System Design.mp4 835.66 MB
3.4 - Secure Staging Deployment Concepts.mp4 407.81 MB
3.5 - Security Implications of Embedded Systems.mp4 741.53 MB
3.6 - Secure App Development and Deployment.mp4 800.19 MB
3.7 - Cloud and Virtualization Concepts.mp4 463.21 MB
3.72 - Cloud and Virtalization Concepts Part 2.mp4 458.79 MB
3.8 - Resiliency and Automation to Reduce Risk.mp4 670.78 MB
3.91 - Importance of Physical Security.mp4 557.58 MB
3.92 - Importance of Physical Security Part 2.mp4 541.14 MB
4.1 - Identity and Access Management Concepts.mp4 485.15 MB
4.2 - Identity and Access Services.mp4 522.46 MB
4.31 - Identity and Access Management Controls.mp4 557.06 MB
4.32 - Identity and Access Management Controls Part 2.mp4 402.41 MB
4.4 - Account Management Practices.mp4 455.61 MB
4.42 - Account Management Practices Part 2.mp4 600.47 MB
5.1 - Policies, Plans and Procedures.mp4 543.02 MB
5.2 - Business Impact Analysis.mp4 702.97 MB
5.3 - Risk Management Processes and Concepts.mp4 783.06 MB
5.4 - Incident Response Procedures.mp4 554.4 MB
5.5 - Basic Concepts of Forensics.mp4 537.22 MB
5.61 - Disaster Recovery and Business Continuity.mp4 579.87 MB
5.62 - Disaster Recovery and Business Continuity Part 2.mp4 645.13 MB
5.8 - Data Security and Privacy.mp4 592.69 MB
6.1 - Basic Concepts of Cryptography.mp4 334.03 MB
6.12 - Basic Concepts of Cryptography Part 2.mp4 749.67 MB
6.21 - Cryptography Algorithms Basics.mp4 481.04 MB
6.22 - Cryptography Algorithms Basics Part 2.mp4 555.44 MB
6.23 - Cryptography Algorithms Basics Part 3.mp4 524.21 MB
6.3 - Wireless Security.mp4 379.38 MB
6.4 - Public Key Infrastructure.mp4 463.84 MB
6.42 - Public Key Infrastructure Part 2.mp4 476.87 MB
6.43 - Public Key Infrastructure Part 3.mp4 299.6 MB
6.44 - Public Key Infrastructure Part 4.mp4 462.81 MB
Download Info
-
Tips
“ITPT76” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.