FileMood

Download LA264

LA264

Name

LA264

 DOWNLOAD Copy Link

Total Size

5.6 GB

Total Files

64

Hash

684A5C32E5DA8AF97B01FA6BB424739C19C76360

/

001 - About the Author.mp4

5.9 MB

002 - About the Course.mp4

21.4 MB

003 - About the Exam.mp4

37.0 MB

004 - Understanding IOCs.mp4

113.9 MB

005 - Types of Malware.mp4

114.7 MB

006 - Social Engineering Attacks.mp4

52.5 MB

007 - Technical Attacks.mp4

100.1 MB

008 - Wireless and Cryptographic Attacks.mp4

106.7 MB

009 - Threat Actor Types and Attributes.mp4

102.6 MB

010 - Pentesting Concepts.mp4

83.6 MB

011 - Explain concepts of vulnerability scanning.mp4

77.8 MB

012 - Discuss the Impact of Vulnerability Types.mp4

162.4 MB

013 - Firewalls.mp4

104.3 MB

014 - IDS_IPS.mp4

120.4 MB

015 - Router and Switch Security.mp4

56.7 MB

016 - Proxies and Load balancers.mp4

69.7 MB

017 - Other Network Components.mp4

153.2 MB

018 - Tool Overview.mp4

146.4 MB

019 - Command Line Tools.mp4

92.6 MB

020 - Common Security Issues and their Impact.mp4

175.1 MB

021 - Connection methodologies defined.mp4

116.1 MB

022 - Mobile Device Management Principles.mp4

110.8 MB

023 - Monitoring and Enforcing Mobile methodologies.mp4

180.2 MB

024 - Secure Protocols Overview.mp4

104.3 MB

025 - Frameworks Overview.mp4

84.7 MB

026 - Discussing the concepts that will help secure your network.mp4

63.5 MB

027 - Hardware security.mp4

92.2 MB

028 - Operating Systems.mp4

112.4 MB

029 - Staging Environments and security implications.mp4

57.0 MB

030 - Security Implications of Embedded Systems.mp4

136.4 MB

031 - Development Lifecycle Models.mp4

55.4 MB

032 - Secure DevOps.mp4

93.1 MB

033 - Secure coding techniques and best practices.mp4

138.0 MB

034 - Code quality and testing.mp4

52.4 MB

035 - Virtualization Concepts.mp4

64.9 MB

036 - Cloud Concepts.mp4

81.6 MB

037 - Resiliency and Automation.mp4

94.6 MB

038 - Redundancy and High Availability.mp4

61.9 MB

039 - Physical Controls.mp4

128.9 MB

040 - Identification, authentication, authorization and accounting (AAA).mp4

72.9 MB

041 - Account Management.mp4

132.4 MB

042 - Account Policy Enforcement.mp4

91.2 MB

043 - Define different Identity and Access Service Types.mp4

82.4 MB

044 - Identity and Access Services Part 2.mp4

50.7 MB

045 - Identity and Access Management Controls.mp4

77.7 MB

046 - Personnel Management.mp4

90.6 MB

047 - Agreement Types.mp4

87.0 MB

048 - Business Impact Analysis.mp4

137.9 MB

049 - Risk Management.mp4

84.1 MB

050 - Incident Response Concepts.mp4

115.5 MB

051 - Digital Forensics.mp4

56.2 MB

052 - Disaster Recovery and Continuity of Operations.mp4

106.3 MB

053 - Differentiating between Control Types.mp4

45.1 MB

054 - Data Security and Privacy Practices.mp4

93.0 MB

055 - Basic Concepts of Cryptography (Part 1).mp4

102.5 MB

056 - Basic Concepts of Cryptography (Part 2).mp4

62.6 MB

057 - Symmetric Algorithms.mp4

64.7 MB

058 - Asymmetric Algorithms.mp4

25.4 MB

059 - Hashing Algorithms.mp4

32.2 MB

060 - Wireless Cryptography.mp4

88.4 MB

061 - PKI Overview.mp4

58.7 MB

062 - Types of Certificates.mp4

76.2 MB

063 - Concepts.mp4

43.9 MB

Torrent_downloaded_from_Demonoid.is_.txt

0.1 KB

 

Total files 64


Copyright © 2024 FileMood.com