Security+

Size
9.96 GB
Files
50
Seeders
1
Leechers
0
AddTime
1 year
Source
DHT
Updated
1 day | Update Tracker
Info Hash
9683537edfc293ee88626708dff17edd82f7e59a
Keywords
Magnet
magnet:?xt=urn:btih:9683537edfc293ee88626708dff17edd82f7e59a
.Torrent
Mirror 1 | Mirror 2
Warning! Use a VPN When Downloading Torrents!
Your Country is . IP Address is
Your Internet Provider can see when you download torrents! Hide your IP ADDRESS with a VPN!
We strongly recommend Trust.Zone VPN to hide your torrenting. It's FREE!
HIDE ME NOW

File List

864 MB 01 - Network Security/03 - Securing Network Devices.mp4
749 MB 01 - Network Security/04 - Network Administration Principles.mp4
737 MB 02 - Compliance and Operational Security/04 - Physical Security & Awareness.mp4
725 MB 06 - Cryptography/01 - Cryptography.mp4
693 MB 02 - Compliance and Operational Security/03 - Security Management Practices.mp4
683 MB 01 - Network Security/02 - Protocols and Services.mp4
544 MB 01 - Network Security/01 - Network Design.mp4
249 MB 03 - Threats and Vulnerabilities/04 - Social Engineering Attacks.mp4
224 MB 02 - Compliance and Operational Security/05 - Risk Management Strategies.mp4
218 MB 02 - Compliance and Operational Security/08 - Security Goals.mp4
202 MB 03 - Threats and Vulnerabilities/08 - Application Attacks Part 2.mp4
202 MB 05 - Access Control and Identity Management/01 - Compare Authentication Services.mp4
201 MB 04 - Application/ Data and Host Security/06 - Mobile Security.mp4
196 MB 04 - Application/ Data and Host Security/07 - Mobile Security Part 2.mp4
195 MB 03 - Threats and Vulnerabilities/05 - Wireless Attacks.mp4
192 MB 02 - Compliance and Operational Security/07 - Basic Forensic Procedures.mp4
190 MB 04 - Application/ Data and Host Security/01 - Explain App Security Controls.mp4
188 MB 03 - Threats and Vulnerabilities/07 - Application Attacks.mp4
183 MB 02 - Compliance and Operational Security/06 - Risk Management Strategies Part 2.mp4
183 MB 04 - Application/ Data and Host Security/03 - Explain App Security Controls Part 3.mp4
181 MB 03 - Threats and Vulnerabilities/10 - Pentesting vs Vulnerability Scanning Part 2.mp4
180 MB 03 - Threats and Vulnerabilities/09 - Pentesting vs Vulnerability Scanning.mp4
176 MB 03 - Threats and Vulnerabilities/03 - Summarizing Various Attacks Part 2.mp4
173 MB 03 - Threats and Vulnerabilities/06 - Wireless Attacks Part 2.mp4
172 MB 07 - Additional Topics/01 - Additional Information.mp4
166 MB 05 - Access Control and Identity Management/02 - Compare Authentication Services Part 2.mp4
162 MB 04 - Application/ Data and Host Security/02 - Explain App Security Controls Part 2.mp4
160 MB 04 - Application/ Data and Host Security/04 - Host Security.mp4
159 MB 03 - Threats and Vulnerabilities/01 - Analyze Mitigation and Deterrents.mp4
154 MB 03 - Threats and Vulnerabilities/02 - Summarizing Various Attacks.mp4
154 MB 02 - Compliance and Operational Security/01 - Risk Concepts.mp4
154 MB 05 - Access Control and Identity Management/05 - Configure Account Management Controls.mp4
144 MB 04 - Application/ Data and Host Security/05 - Host Security Part 2.mp4
143 MB 02 - Compliance and Operational Security/02 - Risk Concepts Part 2.mp4
141 MB 05 - Access Control and Identity Management/04 - Understand Access Control Part 2.mp4
112 MB 05 - Access Control and Identity Management/03 - Understand Access Control.mp4
52.6 MB 00 - Introduction to Security+.mp4
38.9 KB 02 - Compliance and Operational Security/04.pdf
38.3 KB 03 - Threats and Vulnerabilities/01.pdf
34.8 KB 04 - Application/ Data and Host Security/01.pdf
33.6 KB 02 - Compliance and Operational Security/01.pdf
33 KB 03 - Threats and Vulnerabilities/02.pdf
31.8 KB 01 - Network Security/04.pdf
31.2 KB 01 - Network Security/01.pdf
30.7 KB 03 - Threats and Vulnerabilities/04.pdf
30.4 KB 02 - Compliance and Operational Security/03.pdf
29.8 KB 01 - Network Security/03.pdf
28.7 KB 06 - Cryptography/01.pdf
21.1 KB 03 - Threats and Vulnerabilities/06.pdf
19.6 KB 03 - Threats and Vulnerabilities/05.pdf

array(1) { [0]=> string(5) "movie" }