YourBittorrent
Categories
Movies
Music
Television
Games
Software
Anime
XXX
eBooks
Photos
Other
Upload
More
News
Legal
Advertising
Privacy
Bittorrent Clients
Contact
All torrents
Verified only
All categories
Movies
TV
Music
Games
Software
Anime
eBooks
XXX
Search
All torrents
Verified only
All categories
Movies
TV
Music
Games
Software
Anime
eBooks
XXX
Guest
Login
Sign up
[FreeCoursesOnline.Me] O`REILLY - GIAC Security Essentials (GSEC)
Category:
Other
Date:
11/16/21 at 11:59pm GMT+1
Submitter:
Unknown
Seeders:
5
Leechers:
0
File size:
2.9 GB in 95 files
Torrent Status:
This torrent has been
verified
.
Infohash:
cd0d447514fba0256aafeac25db825c6a3470178
File list
[FreeCoursesOnline.Me] O`REILLY - GIAC Security Essentials (GSEC)
[00]. Websites you may like/How you can help our Group!.txt
204 B
[0] Introduction/[0] GIAC Security Essentials (GSEC)_ Introduction.mp4
9.4 MB
[10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[38] Learning objectives.mp4
2.3 MB
[10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[39] 8.1 Defense in Depth Overview and Strategies.mp4
21.2 MB
[10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[40] 8.2 Core Security Strategies.mp4
6.5 MB
[10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[41] 8.3 Defensible Network Architectures.mp4
14.7 MB
[11] Lesson 9_ Active Defense/[42] Learning objectives.mp4
1.9 MB
[11] Lesson 9_ Active Defense/[43] 9.1 Overview of Active Defense.mp4
19.1 MB
[11] Lesson 9_ Active Defense/[44] 9.2 Active Defense Techniques.mp4
18.6 MB
[11] Lesson 9_ Active Defense/[45] 9.3 Active Defense Tools.mp4
37 MB
[12] Lesson 10_ Endpoint Security/[46] Learning objectives.mp4
2.6 MB
[12] Lesson 10_ Endpoint Security/[47] 10.1 Overview of Endpoint Security.mp4
24 MB
[12] Lesson 10_ Endpoint Security/[48] 10.2 Host-based Intrusion Detection.mp4
11.9 MB
[12] Lesson 10_ Endpoint Security/[49] 10.3 Host-based Intrusion Prevention.mp4
14 MB
[12] Lesson 10_ Endpoint Security/[50] 10.4 Next-generation Endpoint Security Solutions.mp4
15.7 MB
[13] Module 3_ Threat Management/[51] Module introduction.mp4
2.6 MB
[14] Lesson 11_ Log Management & SIEM/[52] Learning objectives.mp4
2.2 MB
[14] Lesson 11_ Log Management & SIEM/[53] 11.1 Overview of Logging.mp4
30.2 MB
[14] Lesson 11_ Log Management & SIEM/[54] 11.2 Logging System Setup and Configuration.mp4
15.6 MB
[14] Lesson 11_ Log Management & SIEM/[55] 11.3 Logging Analysis Fundamentals.mp4
18.8 MB
[14] Lesson 11_ Log Management & SIEM/[56] 11.4 Core SIEM Activities.mp4
21.7 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[57] Learning objectives.mp4
2.6 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[58] 12.1 Overview of Vulnerability Management.mp4
36.4 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[59] 12.2 Network Scanning.mp4
42.1 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[60] 12.3 Using Xenmap and Yersinia.mp4
34.7 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[61] 12.4 Penetration Testing.mp4
55.4 MB
[16] Lesson 13_ Virtualization and Cloud Security/[62] Learning objectives.mp4
3.1 MB
[16] Lesson 13_ Virtualization and Cloud Security/[63] 13.1 Overview of Virtualization and VM Security.mp4
27.2 MB
[16] Lesson 13_ Virtualization and Cloud Security/[64] 13.2 Cloud Models and Value Proposition.mp4
75.6 MB
[16] Lesson 13_ Virtualization and Cloud Security/[65] 13.3 Common Attacks Against Cloud Services.mp4
32.9 MB
[16] Lesson 13_ Virtualization and Cloud Security/[66] 13.4 Introduction to Microsoft Azure IAM.mp4
46.6 MB
[17] Module 4_ Cryptography, Risk Management, and Response/[67] Module introduction.mp4
4.7 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[68] Learning objectives.mp4
2.5 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[69] 14.1 Overview of Cryptology and Cryptosystems.mp4
27.3 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[70] 14.2 Cryptographic Hashing.mp4
27 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[71] 14.3 Symmetric Key Cryptography.mp4
18.4 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[72] 14.4 Asymmetric Key Cryptography.mp4
11.2 MB
[19] Lesson 15_ Applied Cryptography/[73] Learning objectives.mp4
2.2 MB
[19] Lesson 15_ Applied Cryptography/[74] 15.1 Digital Signatures.mp4
14.3 MB
[19] Lesson 15_ Applied Cryptography/[75] 15.2 IPsec.mp4
45 MB
[19] Lesson 15_ Applied Cryptography/[76] 15.3 SSLTLS.mp4
15.7 MB
[19] Lesson 15_ Applied Cryptography/[77] 15.4 Public Key Infrastructure.mp4
45.3 MB
[1] Module 1_ Network Security Essentials/[1] Module introduction.mp4
4.7 MB
[20] Lesson 16_ Security Policy/[78] Learning objectives.mp4
2.8 MB
[20] Lesson 16_ Security Policy/[79] 16.1 The Importance of Written Security Policies.mp4
18.4 MB
[20] Lesson 16_ Security Policy/[80] 16.2 Standards, Guidelines, and Procedures.mp4
16.8 MB
[20] Lesson 16_ Security Policy/[81] 16.3 Acceptable Use Policies.mp4
9 MB
[20] Lesson 16_ Security Policy/[82] 16.4 Survey of Sample Policies.mp4
46.1 MB
[21] Lesson 17_ IT Risk Management/[83] Learning objectives.mp4
2.2 MB
[21] Lesson 17_ IT Risk Management/[84] 17.1 Overview of Risk Management.mp4
32.2 MB
[21] Lesson 17_ IT Risk Management/[85] 17.2 Risk Management Best Practices.mp4
32.4 MB
[21] Lesson 17_ IT Risk Management/[86] 17.3 Threat Assessment, Analysis, and Reporting.mp4
55.7 MB
[22] Lesson 18_ Incident Handling and Response/[87] Learning objectives.mp4
2.3 MB
[22] Lesson 18_ Incident Handling and Response/[88] 18.1 Fundamentals of Incident Handling.mp4
15 MB
[22] Lesson 18_ Incident Handling and Response/[89] 18.2 Six Step Incident Response Process.mp4
32.4 MB
[22] Lesson 18_ Incident Handling and Response/[90] 18.3 Conducting a Forensic Investigation.mp4
39.7 MB
[23] Lesson 19_ Contingency Plans/[91] Learning objectives.mp4
2.4 MB
[23] Lesson 19_ Contingency Plans/[92] 19.1 Business Continuity Planning (BCP).mp4
27.8 MB
[23] Lesson 19_ Contingency Plans/[93] 19.2 Business Impact Analysis (BIA).mp4
10.9 MB
[23] Lesson 19_ Contingency Plans/[94] 19.3 Backups and Restoration.mp4
21.7 MB
[23] Lesson 19_ Contingency Plans/[95] 19.4 Disaster Recovery Planning (DRP).mp4
40 MB
[24] Module 5_ Windows Security Essentials/[96] Module introduction.mp4
3.1 MB
[25] Lesson 20_ Windows Security Infrastructure/[100] 20.3 Windows-as-a-Service.mp4
21.9 MB
[25] Lesson 20_ Windows Security Infrastructure/[97] Learning objectives.mp4
2.2 MB
[25] Lesson 20_ Windows Security Infrastructure/[98] 20.1 Operating Systems and Services.mp4
13.9 MB
[25] Lesson 20_ Windows Security Infrastructure/[99] 20.2 Windows Workgroups vs. Domains.mp4
26.8 MB
[26] Lesson 21_ Windows Access Controls/[101] Learning objectives.mp4
2.4 MB
[26] Lesson 21_ Windows Access Controls/[102] 21.1 NTFS and Shared Folder Permissions.mp4
15.2 MB
[26] Lesson 21_ Windows Access Controls/[103] 21.2 Registry Keys and REGEDIT.EXE.mp4
12.4 MB
[26] Lesson 21_ Windows Access Controls/[104] 21.3 Windows Privileges.mp4
18.7 MB
[26] Lesson 21_ Windows Access Controls/[105] 21.4 Overview of BitLocker Drive Encryption.mp4
18.5 MB
[27] Lesson 22_ Enforcing Windows Security Policy/[106] Learning objectives.mp4
2.4 MB
[27] Lesson 22_ Enforcing Windows Security Policy/[107] 22.1 Security Templates and SCA Snap-in.mp4
16.9 MB
[27] Lesson 22_ Enforcing Windows Security Policy/[108] 22.2 Understanding Group Policy Objects.mp4
13.4 MB
[27] Lesson 22_ Enforcing Windows Security Policy/[109] 22.3 Administrative Users, AppLocker, and User Account Control.mp4
15.1 MB
[28] Lesson 23_ Windows Network Services and Cloud Computing/[110] Learning objectives.mp4
2.4 MB
[28] Lesson 23_ Windows Network Services and Cloud Computing/[111] 23.1 Azure and High Availability.mp4
29.5 MB
[28] Lesson 23_ Windows Network Services and Cloud Computing/[112] 23.2 Configuring Azure VM Attributes.mp4
25.3 MB
[28] Lesson 23_ Windows Network Services and Cloud Computing/[113] 23.3 Microsoft Azure Active Directory (MAAD).mp4
35.4 MB
[29] Lesson 24_ Windows Automation, Auditing, and Forensics/[114] Learning objectives.mp4
2 MB
[29] Lesson 24_ Windows Automation, Auditing, and Forensics/[115] 24.1 Windows PowerShell.mp4
46.9 MB
[29] Lesson 24_ Windows Automation, Auditing, and Forensics/[116] 24.2 Administrative Tools and Utilities.mp4
47.1 MB
[29] Lesson 24_ Windows Automation, Auditing, and Forensics/[117] 24.3 Windows Auditing and Forensics.mp4
25.5 MB
[2] Lesson 1_ TCP IP Essentials/[2] Learning objectives.mp4
3 MB
[2] Lesson 1_ TCP IP Essentials/[3] 1.1 Network Protocols and Reference Models.mp4
30.5 MB
[2] Lesson 1_ TCP IP Essentials/[4] 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4
54 MB
[2] Lesson 1_ TCP IP Essentials/[5] 1.3 Layer 4 Protocols.mp4
54.6 MB
[2] Lesson 1_ TCP IP Essentials/[6] 1.4 Setting up a Lab Environment.mp4
40.8 MB
[2] Lesson 1_ TCP IP Essentials/[7] 1.5 Using tcpdump and Wireshark.mp4
26.9 MB
[30] Module 6_ Linux Security Essentials/[118] Module introduction.mp4
3.1 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[119] Learning objectives.mp4
2.7 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[120] 25.1 Comparing Linux Operating Systems.mp4
28.1 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[121] 25.2 Mobile Device Security.mp4
12.5 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[122] 25.3 Linux Shells and Kernels.mp4
18.8 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[123] 25.4 Linux Permissions.mp4
29.3 MB
Similar Torrents
Category
Name
Size
Date
[FreeCoursesOnline.Me] CBTNugget - Certified Kubernetes Security Specialist (CKS)
7.6 GB
11/09/22
16
2
[FreeCoursesOnline.Me] TCM Security Academy - Practical Ethical Hacking [2021]
12 GB
12/23/21
15
1
[FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
6.2 GB
07/27/23
14
5
[FreeCoursesOnline.Me] O`REILLY - Certified Ethical Hacker (CEH) Complete Video Course, ...
3.9 GB
12/12/21
13
0
[FreeCoursesOnline.Me] CBTNugget - Cloud Security Training for Software Developers
749 MB
03/23/23
13
0
[FreeCoursesOnline.Me] O`REILLY - Fundamentals of Secure Software
1.9 GB
02/20/23
12
2
[FreeCoursesOnline.Me] Coursera - Computer Security and Systems Management Specialization
2.3 GB
08/14/23
12
2
[FreeCoursesOnline.Me] SkillShare - SQL Programming The SQL Database Programming Essent ...
537 MB
04/21/22
10
0
[FreeCoursesOnline.Me] INE - Secure Architecture Design
2.1 GB
03/23/23
10
2
[FreeCoursesOnline.Me] Linux Academy - DevSecOps Essentials
2 GB
03/08/20
8
0
[FreeCoursesOnline.Me] O`REILLY - GitOps and Kubernetes Video edition
2.8 GB
03/02/22
8
2
[FreeCoursesOnline.Me] O`REILLY - Introduction To Docker CI-CD
1.7 GB
06/27/22
8
0
[FreeCoursesOnline.Me] SkillShare - Figma Practical Essentials Design Movies App UI
535 MB
06/29/23
8
3
[FreeCoursesOnline.Me] Pluralsight - Network Protocols for Security - DNS
119 MB
12/18/23
8
0
[FreeCoursesOnline.Me] [LYNDA] Revit 2020 Essential Training for Architecture (Metric) [FCO]
2.9 GB
10/24/19
7
0