File | Size |
---|
1. Introduction/1. Introduction.mp4 | 33.25 MB |
1. Introduction/1. Introduction.vtt | 2.53 kB |
1. Introduction/1.1 Notes 9.pdf.pdf | 241.64 kB |
1. Introduction/1.10 Notes 5.pdf.pdf | 225.15 kB |
1. Introduction/1.11 Notes 7.pdf.pdf | 240.17 kB |
1. Introduction/1.12 Notes 8.pdf.pdf | 255.67 kB |
1. Introduction/1.13 Notes 12.pdf.pdf | 266.76 kB |
1. Introduction/1.14 Notes 2.pdf.pdf | 223.23 kB |
1. Introduction/1.2 Notes 4.pdf.pdf | 219.31 kB |
1. Introduction/1.3 Notes 14.pdf.pdf | 225.99 kB |
1. Introduction/1.4 Notes 10.pdf.pdf | 236.81 kB |
1. Introduction/1.5 Notes 3.pdf.pdf | 303.42 kB |
1. Introduction/1.6 Notes 13.pdf.pdf | 246.22 kB |
1. Introduction/1.7 Notes 6.pdf.pdf | 227.97 kB |
1. Introduction/1.8 Notes 1.pdf.pdf | 227.43 kB |
1. Introduction/1.9 Notes 11.pdf.pdf | 254.93 kB |
1. Introduction/10. Compliance and Ethics.mp4 | 21.25 MB |
1. Introduction/10. Compliance and Ethics.vtt | 3.71 kB |
1. Introduction/11. Industry Specific Laws.mp4 | 31.52 MB |
1. Introduction/11. Industry Specific Laws.vtt | 4.24 kB |
1. Introduction/12. Computer Crimes.mp4 | 17.76 MB |
1. Introduction/12. Computer Crimes.vtt | 2.78 kB |
1. Introduction/13. Software Licensing.mp4 | 23.96 MB |
1. Introduction/13. Software Licensing.vtt | 4.23 kB |
1. Introduction/14. Data Breaches and Ethics.mp4 | 15.68 MB |
1. Introduction/14. Data Breaches and Ethics.vtt | 2.07 kB |
1. Introduction/15. Security Policy Framework.mp4 | 18.31 MB |
1. Introduction/15. Security Policy Framework.vtt | 3.11 kB |
1. Introduction/16. Common Policies and Key Principles.mp4 | 27.13 MB |
1. Introduction/16. Common Policies and Key Principles.vtt | 5.63 kB |
1. Introduction/17. Business Continuity Planning.mp4 | 13.56 MB |
1. Introduction/17. Business Continuity Planning.vtt | 2.43 kB |
1. Introduction/18. Business Continuity Controls and Key Technical Concepts.mp4 | 28.66 MB |
1. Introduction/18. Business Continuity Controls and Key Technical Concepts.vtt | 4.96 kB |
1. Introduction/19. RAID Technology.mp4 | 23.88 MB |
1. Introduction/19. RAID Technology.vtt | 3.26 kB |
1. Introduction/2. Understanding Information Security.mp4 | 26.06 MB |
1. Introduction/2. Understanding Information Security.vtt | 4.90 kB |
1. Introduction/20. Risk Management.mp4 | 22.69 MB |
1. Introduction/20. Risk Management.vtt | 4.47 kB |
1. Introduction/21. Risk Assessment Techniques.mp4 | 23.23 MB |
1. Introduction/21. Risk Assessment Techniques.vtt | 3.04 kB |
1. Introduction/22. Quantitative Risk Factors.mp4 | 31.42 MB |
1. Introduction/22. Quantitative Risk Factors.vtt | 5.60 kB |
1. Introduction/23. Risk Management Strategies.mp4 | 25.61 MB |
1. Introduction/23. Risk Management Strategies.vtt | 3.60 kB |
1. Introduction/24. Security Controls.mp4 | 23.69 MB |
1. Introduction/24. Security Controls.vtt | 4.42 kB |
1. Introduction/25. Understanding Data Security.mp4 | 19.46 MB |
1. Introduction/25. Understanding Data Security.vtt | 3.16 kB |
1. Introduction/26. Data Security Policies.mp4 | 26.04 MB |
1. Introduction/26. Data Security Policies.vtt | 3.46 kB |
1. Introduction/27. Data Security Roles.mp4 | 18.84 MB |
1. Introduction/27. Data Security Roles.vtt | 3.35 kB |
1. Introduction/28. Data Privacy.mp4 | 30.52 MB |
1. Introduction/28. Data Privacy.vtt | 4.69 kB |
1. Introduction/29. Developing Security Baselines.mp4 | 22.82 MB |
1. Introduction/29. Developing Security Baselines.vtt | 3.59 kB |
1. Introduction/3. Hashing.mp4 | 32.85 MB |
1. Introduction/3. Hashing.vtt | 3.03 kB |
1. Introduction/30. Leveraging Industry Standards.mp4 | 45.80 MB |
1. Introduction/30. Leveraging Industry Standards.vtt | 5.51 kB |
1. Introduction/31. Customizing Security Standards.mp4 | 22.93 MB |
1. Introduction/31. Customizing Security Standards.vtt | 3.35 kB |
1. Introduction/32. Understanding Encryption.mp4 | 28.65 MB |
1. Introduction/32. Understanding Encryption.vtt | 2.98 kB |
1. Introduction/33. Secure Design Principles.mp4 | 56.29 MB |
1. Introduction/33. Secure Design Principles.vtt | 9.31 kB |
1. Introduction/34. Security Models.mp4 | 43.98 MB |
1. Introduction/34. Security Models.vtt | 6.52 kB |
1. Introduction/35. Security Requirements.mp4 | 74.68 MB |
1. Introduction/35. Security Requirements.vtt | 10.78 kB |
1. Introduction/36. Virtualization.mp4 | 63.48 MB |
1. Introduction/36. Virtualization.vtt | 8.98 kB |
1. Introduction/37. Cloud Computing Models.mp4 | 48.98 MB |
1. Introduction/37. Cloud Computing Models.vtt | 7.02 kB |
1. Introduction/38. Public Cloud Tiers.mp4 | 56.30 MB |
1. Introduction/38. Public Cloud Tiers.vtt | 6.97 kB |
1. Introduction/39. Memory Protection.mp4 | 62.11 MB |
1. Introduction/39. Memory Protection.vtt | 7.81 kB |
1. Introduction/4. Digital Signatures and Digital Certificates.mp4 | 18.63 MB |
1. Introduction/4. Digital Signatures and Digital Certificates.vtt | 2.80 kB |
1. Introduction/40. Interface Protection.mp4 | 85.17 MB |
1. Introduction/40. Interface Protection.vtt | 10.24 kB |
1. Introduction/41. High Availability and Fault Tolerance.mp4 | 47.99 MB |
1. Introduction/41. High Availability and Fault Tolerance.vtt | 6.55 kB |
1. Introduction/42. OWASP Top 10.mp4 | 40.41 MB |
1. Introduction/42. OWASP Top 10.vtt | 4.14 kB |
1. Introduction/43. SQL Injection Prevention.mp4 | 26.83 MB |
1. Introduction/43. SQL Injection Prevention.vtt | 5.34 kB |
1. Introduction/44. Cross-Site Scripting Prevention.mp4 | 31.69 MB |
1. Introduction/44. Cross-Site Scripting Prevention.vtt | 5.06 kB |
1. Introduction/45. Cross-Site Request Forgery.mp4 | 21.49 MB |
1. Introduction/45. Cross-Site Request Forgery.vtt | 3.46 kB |
1. Introduction/46. Understanding Encryption.mp4 | 28.66 MB |
1. Introduction/46. Understanding Encryption.vtt | 2.98 kB |
1. Introduction/47. Symmetric and Asymmetric Cryptography.mp4 | 47.79 MB |
1. Introduction/47. Symmetric and Asymmetric Cryptography.vtt | 8.23 kB |
1. Introduction/48. Cryptography Goals.mp4 | 15.95 MB |
1. Introduction/48. Cryptography Goals.vtt | 3.06 kB |
1. Introduction/49. Codes and Ciphers.mp4 | 23.21 MB |
1. Introduction/49. Codes and Ciphers.vtt | 3.81 kB |
1. Introduction/5. Availability.mp4 | 18.86 MB |
1. Introduction/5. Availability.vtt | 3.29 kB |
1. Introduction/50. Key Lifecycle Management.mp4 | 81.71 MB |
1. Introduction/50. Key Lifecycle Management.vtt | 13.46 kB |
1. Introduction/51. Data Encryption Standards (DES).mp4 | 24.69 MB |
1. Introduction/51. Data Encryption Standards (DES).vtt | 3.97 kB |
1. Introduction/52. Triple DES (3DES).mp4 | 32.28 MB |
1. Introduction/52. Triple DES (3DES).vtt | 3.93 kB |
1. Introduction/53. AES, Blowfish, and Twofish.mp4 | 61.15 MB |
1. Introduction/53. AES, Blowfish, and Twofish.vtt | 9.39 kB |
1. Introduction/54. RC4.mp4 | 17.86 MB |
1. Introduction/54. RC4.vtt | 3.24 kB |
1. Introduction/55. RSA Encryption.mp4 | 60.90 MB |
1. Introduction/55. RSA Encryption.vtt | 8.08 kB |
1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.mp4 | 23.03 MB |
1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.vtt | 4.18 kB |
1. Introduction/57. Key Exchange.mp4 | 22.75 MB |
1. Introduction/57. Key Exchange.vtt | 4.31 kB |
1. Introduction/58. Diffie-Hellman Key Exchange.mp4 | 54.29 MB |
1. Introduction/58. Diffie-Hellman Key Exchange.vtt | 9.51 kB |
1. Introduction/59. Key Escrow.mp4 | 42.91 MB |
1. Introduction/59. Key Escrow.vtt | 4.99 kB |
1. Introduction/6. Security Governance.mp4 | 15.81 MB |
1. Introduction/6. Security Governance.vtt | 3.21 kB |
1. Introduction/60. Trust Models.mp4 | 22.76 MB |
1. Introduction/60. Trust Models.vtt | 3.78 kB |
1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.mp4 | 39.24 MB |
1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.vtt | 5.22 kB |
1. Introduction/62. Hash Functions.mp4 | 32.84 MB |
1. Introduction/62. Hash Functions.vtt | 3.03 kB |
1. Introduction/63. Digital Signatures and Digital Certificates.mp4 | 18.65 MB |
1. Introduction/63. Digital Signatures and Digital Certificates.vtt | 2.80 kB |
1. Introduction/7. Organizational Processes.mp4 | 18.01 MB |
1. Introduction/7. Organizational Processes.vtt | 3.94 kB |
1. Introduction/8. Security Roles and Responsibilities.mp4 | 14.68 MB |
1. Introduction/8. Security Roles and Responsibilities.vtt | 2.87 kB |
1. Introduction/9. Control Frameworks.mp4 | 32.17 MB |
1. Introduction/9. Control Frameworks.vtt | 4.61 kB |
Discuss.FreeTutorials.Us.html | 165.68 kB |
FreeCoursesOnline.Me.html | 108.30 kB |
FreeTutorials.Eu.html | 102.23 kB |
How you can help Team-FTU.txt | 259.00 B |
Torrent Downloaded From GloDls.to.txt | 84.00 B |
[TGx]Downloaded from torrentgalaxy.org.txt | 524.00 B |