[FreeCoursesOnline.Me] O`REILLY - GIAC Security Essentials (GSEC)


[FreeCoursesOnline.Me] O`REILLY - GIAC Security Essentials (GSEC)
Category:
Date:
11/16/21 at 11:59pm GMT+1
Submitter:
Seeders:
5
Leechers:
0
File size:
2.9 GB in 95 files

Torrent Status:
  This torrent has been verified.

Infohash:
cd0d447514fba0256aafeac25db825c6a3470178


File list

  • [FreeCoursesOnline.Me] O`REILLY - GIAC Security Essentials (GSEC)
  • icon [00]. Websites you may like/How you can help our Group!.txt 204 B
    icon [0] Introduction/[0] GIAC Security Essentials (GSEC)_ Introduction.mp4 9.4 MB
    icon [10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[38] Learning objectives.mp4 2.3 MB
    icon [10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[39] 8.1 Defense in Depth Overview and Strategies.mp4 21.2 MB
    icon [10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[40] 8.2 Core Security Strategies.mp4 6.5 MB
    icon [10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[41] 8.3 Defensible Network Architectures.mp4 14.7 MB
    icon [11] Lesson 9_ Active Defense/[42] Learning objectives.mp4 1.9 MB
    icon [11] Lesson 9_ Active Defense/[43] 9.1 Overview of Active Defense.mp4 19.1 MB
    icon [11] Lesson 9_ Active Defense/[44] 9.2 Active Defense Techniques.mp4 18.6 MB
    icon [11] Lesson 9_ Active Defense/[45] 9.3 Active Defense Tools.mp4 37 MB
    icon [12] Lesson 10_ Endpoint Security/[46] Learning objectives.mp4 2.6 MB
    icon [12] Lesson 10_ Endpoint Security/[47] 10.1 Overview of Endpoint Security.mp4 24 MB
    icon [12] Lesson 10_ Endpoint Security/[48] 10.2 Host-based Intrusion Detection.mp4 11.9 MB
    icon [12] Lesson 10_ Endpoint Security/[49] 10.3 Host-based Intrusion Prevention.mp4 14 MB
    icon [12] Lesson 10_ Endpoint Security/[50] 10.4 Next-generation Endpoint Security Solutions.mp4 15.7 MB
    icon [13] Module 3_ Threat Management/[51] Module introduction.mp4 2.6 MB
    icon [14] Lesson 11_ Log Management & SIEM/[52] Learning objectives.mp4 2.2 MB
    icon [14] Lesson 11_ Log Management & SIEM/[53] 11.1 Overview of Logging.mp4 30.2 MB
    icon [14] Lesson 11_ Log Management & SIEM/[54] 11.2 Logging System Setup and Configuration.mp4 15.6 MB
    icon [14] Lesson 11_ Log Management & SIEM/[55] 11.3 Logging Analysis Fundamentals.mp4 18.8 MB
    icon [14] Lesson 11_ Log Management & SIEM/[56] 11.4 Core SIEM Activities.mp4 21.7 MB
    icon [15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[57] Learning objectives.mp4 2.6 MB
    icon [15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[58] 12.1 Overview of Vulnerability Management.mp4 36.4 MB
    icon [15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[59] 12.2 Network Scanning.mp4 42.1 MB
    icon [15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[60] 12.3 Using Xenmap and Yersinia.mp4 34.7 MB
    icon [15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[61] 12.4 Penetration Testing.mp4 55.4 MB
    icon [16] Lesson 13_ Virtualization and Cloud Security/[62] Learning objectives.mp4 3.1 MB
    icon [16] Lesson 13_ Virtualization and Cloud Security/[63] 13.1 Overview of Virtualization and VM Security.mp4 27.2 MB
    icon [16] Lesson 13_ Virtualization and Cloud Security/[64] 13.2 Cloud Models and Value Proposition.mp4 75.6 MB
    icon [16] Lesson 13_ Virtualization and Cloud Security/[65] 13.3 Common Attacks Against Cloud Services.mp4 32.9 MB
    icon [16] Lesson 13_ Virtualization and Cloud Security/[66] 13.4 Introduction to Microsoft Azure IAM.mp4 46.6 MB
    icon [17] Module 4_ Cryptography, Risk Management, and Response/[67] Module introduction.mp4 4.7 MB
    icon [18] Lesson 14_ Cryptography Concepts and Algorithms/[68] Learning objectives.mp4 2.5 MB
    icon [18] Lesson 14_ Cryptography Concepts and Algorithms/[69] 14.1 Overview of Cryptology and Cryptosystems.mp4 27.3 MB
    icon [18] Lesson 14_ Cryptography Concepts and Algorithms/[70] 14.2 Cryptographic Hashing.mp4 27 MB
    icon [18] Lesson 14_ Cryptography Concepts and Algorithms/[71] 14.3 Symmetric Key Cryptography.mp4 18.4 MB
    icon [18] Lesson 14_ Cryptography Concepts and Algorithms/[72] 14.4 Asymmetric Key Cryptography.mp4 11.2 MB
    icon [19] Lesson 15_ Applied Cryptography/[73] Learning objectives.mp4 2.2 MB
    icon [19] Lesson 15_ Applied Cryptography/[74] 15.1 Digital Signatures.mp4 14.3 MB
    icon [19] Lesson 15_ Applied Cryptography/[75] 15.2 IPsec.mp4 45 MB
    icon [19] Lesson 15_ Applied Cryptography/[76] 15.3 SSLTLS.mp4 15.7 MB
    icon [19] Lesson 15_ Applied Cryptography/[77] 15.4 Public Key Infrastructure.mp4 45.3 MB
    icon [1] Module 1_ Network Security Essentials/[1] Module introduction.mp4 4.7 MB
    icon [20] Lesson 16_ Security Policy/[78] Learning objectives.mp4 2.8 MB
    icon [20] Lesson 16_ Security Policy/[79] 16.1 The Importance of Written Security Policies.mp4 18.4 MB
    icon [20] Lesson 16_ Security Policy/[80] 16.2 Standards, Guidelines, and Procedures.mp4 16.8 MB
    icon [20] Lesson 16_ Security Policy/[81] 16.3 Acceptable Use Policies.mp4 9 MB
    icon [20] Lesson 16_ Security Policy/[82] 16.4 Survey of Sample Policies.mp4 46.1 MB
    icon [21] Lesson 17_ IT Risk Management/[83] Learning objectives.mp4 2.2 MB
    icon [21] Lesson 17_ IT Risk Management/[84] 17.1 Overview of Risk Management.mp4 32.2 MB
    icon [21] Lesson 17_ IT Risk Management/[85] 17.2 Risk Management Best Practices.mp4 32.4 MB
    icon [21] Lesson 17_ IT Risk Management/[86] 17.3 Threat Assessment, Analysis, and Reporting.mp4 55.7 MB
    icon [22] Lesson 18_ Incident Handling and Response/[87] Learning objectives.mp4 2.3 MB
    icon [22] Lesson 18_ Incident Handling and Response/[88] 18.1 Fundamentals of Incident Handling.mp4 15 MB
    icon [22] Lesson 18_ Incident Handling and Response/[89] 18.2 Six Step Incident Response Process.mp4 32.4 MB
    icon [22] Lesson 18_ Incident Handling and Response/[90] 18.3 Conducting a Forensic Investigation.mp4 39.7 MB
    icon [23] Lesson 19_ Contingency Plans/[91] Learning objectives.mp4 2.4 MB
    icon [23] Lesson 19_ Contingency Plans/[92] 19.1 Business Continuity Planning (BCP).mp4 27.8 MB
    icon [23] Lesson 19_ Contingency Plans/[93] 19.2 Business Impact Analysis (BIA).mp4 10.9 MB
    icon [23] Lesson 19_ Contingency Plans/[94] 19.3 Backups and Restoration.mp4 21.7 MB
    icon [23] Lesson 19_ Contingency Plans/[95] 19.4 Disaster Recovery Planning (DRP).mp4 40 MB
    icon [24] Module 5_ Windows Security Essentials/[96] Module introduction.mp4 3.1 MB
    icon [25] Lesson 20_ Windows Security Infrastructure/[100] 20.3 Windows-as-a-Service.mp4 21.9 MB
    icon [25] Lesson 20_ Windows Security Infrastructure/[97] Learning objectives.mp4 2.2 MB
    icon [25] Lesson 20_ Windows Security Infrastructure/[98] 20.1 Operating Systems and Services.mp4 13.9 MB
    icon [25] Lesson 20_ Windows Security Infrastructure/[99] 20.2 Windows Workgroups vs. Domains.mp4 26.8 MB
    icon [26] Lesson 21_ Windows Access Controls/[101] Learning objectives.mp4 2.4 MB
    icon [26] Lesson 21_ Windows Access Controls/[102] 21.1 NTFS and Shared Folder Permissions.mp4 15.2 MB
    icon [26] Lesson 21_ Windows Access Controls/[103] 21.2 Registry Keys and REGEDIT.EXE.mp4 12.4 MB
    icon [26] Lesson 21_ Windows Access Controls/[104] 21.3 Windows Privileges.mp4 18.7 MB
    icon [26] Lesson 21_ Windows Access Controls/[105] 21.4 Overview of BitLocker Drive Encryption.mp4 18.5 MB
    icon [27] Lesson 22_ Enforcing Windows Security Policy/[106] Learning objectives.mp4 2.4 MB
    icon [27] Lesson 22_ Enforcing Windows Security Policy/[107] 22.1 Security Templates and SCA Snap-in.mp4 16.9 MB
    icon [27] Lesson 22_ Enforcing Windows Security Policy/[108] 22.2 Understanding Group Policy Objects.mp4 13.4 MB
    icon [27] Lesson 22_ Enforcing Windows Security Policy/[109] 22.3 Administrative Users, AppLocker, and User Account Control.mp4 15.1 MB
    icon [28] Lesson 23_ Windows Network Services and Cloud Computing/[110] Learning objectives.mp4 2.4 MB
    icon [28] Lesson 23_ Windows Network Services and Cloud Computing/[111] 23.1 Azure and High Availability.mp4 29.5 MB
    icon [28] Lesson 23_ Windows Network Services and Cloud Computing/[112] 23.2 Configuring Azure VM Attributes.mp4 25.3 MB
    icon [28] Lesson 23_ Windows Network Services and Cloud Computing/[113] 23.3 Microsoft Azure Active Directory (MAAD).mp4 35.4 MB
    icon [29] Lesson 24_ Windows Automation, Auditing, and Forensics/[114] Learning objectives.mp4 2 MB
    icon [29] Lesson 24_ Windows Automation, Auditing, and Forensics/[115] 24.1 Windows PowerShell.mp4 46.9 MB
    icon [29] Lesson 24_ Windows Automation, Auditing, and Forensics/[116] 24.2 Administrative Tools and Utilities.mp4 47.1 MB
    icon [29] Lesson 24_ Windows Automation, Auditing, and Forensics/[117] 24.3 Windows Auditing and Forensics.mp4 25.5 MB
    icon [2] Lesson 1_ TCP IP Essentials/[2] Learning objectives.mp4 3 MB
    icon [2] Lesson 1_ TCP IP Essentials/[3] 1.1 Network Protocols and Reference Models.mp4 30.5 MB
    icon [2] Lesson 1_ TCP IP Essentials/[4] 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4 54 MB
    icon [2] Lesson 1_ TCP IP Essentials/[5] 1.3 Layer 4 Protocols.mp4 54.6 MB
    icon [2] Lesson 1_ TCP IP Essentials/[6] 1.4 Setting up a Lab Environment.mp4 40.8 MB
    icon [2] Lesson 1_ TCP IP Essentials/[7] 1.5 Using tcpdump and Wireshark.mp4 26.9 MB
    icon [30] Module 6_ Linux Security Essentials/[118] Module introduction.mp4 3.1 MB
    icon [31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[119] Learning objectives.mp4 2.7 MB
    icon [31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[120] 25.1 Comparing Linux Operating Systems.mp4 28.1 MB
    icon [31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[121] 25.2 Mobile Device Security.mp4 12.5 MB
    icon [31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[122] 25.3 Linux Shells and Kernels.mp4 18.8 MB
    icon [31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[123] 25.4 Linux Permissions.mp4 29.3 MB

Similar Torrents