IT Security Foundations Core Concepts


IT Security Foundations Core Concepts
Category:
Date:
12/25/22 at 3:22pm GMT+1
Submitter:
Seeders:
0
Leechers:
2
File size:
328 MB in 98 files

Torrent Status:
  This torrent has been verified.

Infohash:
e3c37d1e858cd9088c5056751eafd4f54e1e8e5a


File list

  • IT Security Foundations Core Concepts
  • icon .pad/0 469 B
    icon .pad/1 359 B
    icon .pad/10 88.7 KB
    icon .pad/11 141.5 KB
    icon .pad/12 245.7 KB
    icon .pad/13 235.2 KB
    icon .pad/14 8.2 KB
    icon .pad/15 232.7 KB
    icon .pad/16 171.3 KB
    icon .pad/17 103.7 KB
    icon .pad/18 123.8 KB
    icon .pad/19 67.3 KB
    icon .pad/2 698 B
    icon .pad/20 205.7 KB
    icon .pad/21 61.2 KB
    icon .pad/22 180.7 KB
    icon .pad/23 111.4 KB
    icon .pad/24 73.7 KB
    icon .pad/25 141.7 KB
    icon .pad/26 99.8 KB
    icon .pad/27 69.8 KB
    icon .pad/28 194.3 KB
    icon .pad/29 49.2 KB
    icon .pad/3 583 B
    icon .pad/30 119.8 KB
    icon .pad/4 52.2 KB
    icon .pad/5 185 KB
    icon .pad/6 250.7 KB
    icon .pad/7 119.8 KB
    icon .pad/8 205 KB
    icon .pad/9 73.7 KB
    icon TutsNode.net.txt 63 B
    icon [TutsNode.net] - IT Security Foundations Core Concepts/01 - Introduction/01 - Tech savvy, tech safe.mp4 8.2 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/01 - Introduction/01 - Tech savvy, tech safe.srt 1.6 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/01 - Introduction/02 - Discovering resources.mp4 4 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/01 - Introduction/02 - Discovering resources.srt 1.7 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/01 - Providing a secure system.mp4 11.2 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/01 - Providing a secure system.srt 5 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/02 - Keeping information safe.mp4 10 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/02 - Keeping information safe.srt 4.1 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/03 - Managing risk.mp4 5.4 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/03 - Managing risk.srt 3.3 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/04 - Analyzing risk.mp4 8.1 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/04 - Analyzing risk.srt 3.1 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/05 - Avoiding scam artists.mp4 10.4 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/05 - Avoiding scam artists.srt 5.2 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/06 - Recognizing the Internet of Things.mp4 11.9 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/02 - 1. Core Security Principles/06 - Recognizing the Internet of Things.srt 5.2 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/01 - Comparing malicious programs.mp4 13 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/01 - Comparing malicious programs.srt 4.3 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/02 - Explaining viruses and worms.mp4 10.4 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/02 - Explaining viruses and worms.srt 4.4 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/03 - Eliminating unwanted surveillance.mp4 8.9 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/03 - Eliminating unwanted surveillance.srt 4.4 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/04 - Defending the OS.mp4 13.2 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/04 - Defending the OS.srt 6.3 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/05 - Holding data hostage.mp4 13.5 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/03 - 2. Understanding Malware/05 - Holding data hostage.srt 6.5 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/01 - Stopping the imposters.mp4 8.8 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/01 - Stopping the imposters.srt 4.7 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/02 - Getting in the backdoor.mp4 8.6 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/02 - Getting in the backdoor.srt 5.2 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/03 - Exploiting the unknown.mp4 10.8 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/03 - Exploiting the unknown.srt 5.6 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/04 - Challenge Recognizing IoT threats.mp4 3.9 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/04 - Challenge Recognizing IoT threats.srt 1.2 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/05 - Solution Recognizing IoT threats.mp4 4.6 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/04 - 3. Breaching Your System/05 - Solution Recognizing IoT threats.srt 1.8 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/01 - Accessing cloud resources.mp4 15.3 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/01 - Accessing cloud resources.srt 3.8 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/02 - Using a secure connection.mp4 12.5 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/02 - Using a secure connection.srt 5.9 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/03 - Accepting cookies.mp4 13.1 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/03 - Accepting cookies.srt 5.9 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/04 - Blocking malicious content.mp4 12.9 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/04 - Blocking malicious content.srt 5.1 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/05 - Ensuring browser privacy.mp4 11.9 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/05 - 4. Investigating Internet Security/05 - Ensuring browser privacy.srt 6.3 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/06 - 5. Mobile and Wireless Security/01 - Securing your Wi-Fi.mp4 13.7 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/06 - 5. Mobile and Wireless Security/01 - Securing your Wi-Fi.srt 6 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/06 - 5. Mobile and Wireless Security/02 - Sharing a secret.mp4 11.5 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/06 - 5. Mobile and Wireless Security/02 - Sharing a secret.srt 5.3 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/06 - 5. Mobile and Wireless Security/03 - Concealing your access point.mp4 7.4 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/06 - 5. Mobile and Wireless Security/03 - Concealing your access point.srt 4.5 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/06 - 5. Mobile and Wireless Security/04 - Protecting mobile devices.mp4 13.2 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/06 - 5. Mobile and Wireless Security/04 - Protecting mobile devices.srt 6.7 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/07 - 6. Secure Devices and Applications/01 - Providing data confidentiality.mp4 10.6 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/07 - 6. Secure Devices and Applications/01 - Providing data confidentiality.srt 5 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/07 - 6. Secure Devices and Applications/02 - Ensuring data integrity.mp4 11.8 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/07 - 6. Secure Devices and Applications/02 - Ensuring data integrity.srt 5.8 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/07 - 6. Secure Devices and Applications/03 - Using cryptographic techniques.mp4 11.9 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/07 - 6. Secure Devices and Applications/03 - Using cryptographic techniques.srt 4.5 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/07 - 6. Secure Devices and Applications/04 - Securing email.mp4 10.2 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/07 - 6. Secure Devices and Applications/04 - Securing email.srt 5.5 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/08 - Conclusion/01 - Next steps.mp4 3.2 MB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/08 - Conclusion/01 - Next steps.srt 1.8 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/Ex_Files_IT_Security_Foundations_Core_Concepts.zip 94.3 KB
    icon [TutsNode.net] - IT Security Foundations Core Concepts/Glossary_IT_Security_Foundations_Core_Concepts.zip 27.8 KB

Similar Torrents