Search Torrents

[UDEMY] Cyber Security and Information Security Fu...


[UDEMY] Cyber Security and Information Security Fundamentals - [FTU] Torrent content (File list)
1. Introduction/10. Compliance and Ethics.mp4 21.2 MB
1. Introduction/10. Compliance and Ethics.vtt 3.7 KB
1. Introduction/1.10 Notes 5.pdf.pdf 225.1 KB
1. Introduction/1.11 Notes 7.pdf.pdf 240.2 KB
1. Introduction/1.12 Notes 8.pdf.pdf 255.7 KB
1. Introduction/1.13 Notes 12.pdf.pdf 266.8 KB
1. Introduction/1.14 Notes 2.pdf.pdf 223.2 KB
1. Introduction/11. Industry Specific Laws.mp4 31.5 MB
1. Introduction/11. Industry Specific Laws.vtt 4.2 KB
1. Introduction/1.1 Notes 9.pdf.pdf 241.6 KB
1. Introduction/12. Computer Crimes.mp4 17.8 MB
1. Introduction/12. Computer Crimes.vtt 2.8 KB
1. Introduction/1.2 Notes 4.pdf.pdf 219.3 KB
1. Introduction/1.3 Notes 14.pdf.pdf 226.0 KB
1. Introduction/13. Software Licensing.mp4 24.0 MB
1. Introduction/13. Software Licensing.vtt 4.2 KB
1. Introduction/14. Data Breaches and Ethics.mp4 15.7 MB
1. Introduction/14. Data Breaches and Ethics.vtt 2.1 KB
1. Introduction/1.4 Notes 10.pdf.pdf 236.8 KB
1. Introduction/1.5 Notes 3.pdf.pdf 303.4 KB
1. Introduction/15. Security Policy Framework.mp4 18.3 MB
1. Introduction/15. Security Policy Framework.vtt 3.1 KB
1. Introduction/16. Common Policies and Key Principles.mp4 27.1 MB
1. Introduction/16. Common Policies and Key Principles.vtt 5.6 KB
1. Introduction/1.6 Notes 13.pdf.pdf 246.2 KB
1. Introduction/17. Business Continuity Planning.mp4 13.6 MB
1. Introduction/17. Business Continuity Planning.vtt 2.4 KB
1. Introduction/1.7 Notes 6.pdf.pdf 228.0 KB
1. Introduction/18. Business Continuity Controls and Key Technical Concepts.mp4 28.7 MB
1. Introduction/18. Business Continuity Controls and Key Technical Concepts.vtt 5.0 KB
1. Introduction/1.8 Notes 1.pdf.pdf 227.4 KB
1. Introduction/1.9 Notes 11.pdf.pdf 254.9 KB
1. Introduction/19. RAID Technology.mp4 23.9 MB
1. Introduction/19. RAID Technology.vtt 3.3 KB
1. Introduction/1. Introduction.mp4 33.2 MB
1. Introduction/1. Introduction.vtt 2.5 KB
1. Introduction/20. Risk Management.mp4 22.7 MB
1. Introduction/20. Risk Management.vtt 4.5 KB
1. Introduction/21. Risk Assessment Techniques.mp4 23.2 MB
1. Introduction/21. Risk Assessment Techniques.vtt 3.0 KB
1. Introduction/22. Quantitative Risk Factors.mp4 31.4 MB
1. Introduction/22. Quantitative Risk Factors.vtt 5.6 KB
1. Introduction/23. Risk Management Strategies.mp4 25.6 MB
1. Introduction/23. Risk Management Strategies.vtt 3.6 KB
1. Introduction/24. Security Controls.mp4 23.7 MB
1. Introduction/24. Security Controls.vtt 4.4 KB
1. Introduction/25. Understanding Data Security.mp4 19.5 MB
1. Introduction/25. Understanding Data Security.vtt 3.2 KB
1. Introduction/26. Data Security Policies.mp4 26.0 MB
1. Introduction/26. Data Security Policies.vtt 3.5 KB
1. Introduction/27. Data Security Roles.mp4 18.8 MB
1. Introduction/27. Data Security Roles.vtt 3.4 KB
1. Introduction/28. Data Privacy.mp4 30.5 MB
1. Introduction/28. Data Privacy.vtt 4.7 KB
1. Introduction/29. Developing Security Baselines.mp4 22.8 MB
1. Introduction/29. Developing Security Baselines.vtt 3.6 KB
1. Introduction/2. Understanding Information Security.mp4 26.1 MB
1. Introduction/2. Understanding Information Security.vtt 4.9 KB
1. Introduction/30. Leveraging Industry Standards.mp4 45.8 MB
1. Introduction/30. Leveraging Industry Standards.vtt 5.5 KB
1. Introduction/31. Customizing Security Standards.mp4 22.9 MB
1. Introduction/31. Customizing Security Standards.vtt 3.4 KB
1. Introduction/32. Understanding Encryption.mp4 28.6 MB
1. Introduction/32. Understanding Encryption.vtt 3.0 KB
1. Introduction/33. Secure Design Principles.mp4 56.3 MB
1. Introduction/33. Secure Design Principles.vtt 9.3 KB
1. Introduction/34. Security Models.mp4 44.0 MB
1. Introduction/34. Security Models.vtt 6.5 KB
1. Introduction/35. Security Requirements.mp4 74.7 MB
1. Introduction/35. Security Requirements.vtt 10.8 KB
1. Introduction/36. Virtualization.mp4 63.5 MB
1. Introduction/36. Virtualization.vtt 9.0 KB
1. Introduction/37. Cloud Computing Models.mp4 49.0 MB
1. Introduction/37. Cloud Computing Models.vtt 7.0 KB
1. Introduction/38. Public Cloud Tiers.mp4 56.3 MB
1. Introduction/38. Public Cloud Tiers.vtt 7.0 KB
1. Introduction/39. Memory Protection.mp4 62.1 MB
1. Introduction/39. Memory Protection.vtt 7.8 KB
1. Introduction/3. Hashing.mp4 32.8 MB
1. Introduction/3. Hashing.vtt 3.0 KB
1. Introduction/40. Interface Protection.mp4 85.2 MB
1. Introduction/40. Interface Protection.vtt 10.2 KB
1. Introduction/41. High Availability and Fault Tolerance.mp4 48.0 MB
1. Introduction/41. High Availability and Fault Tolerance.vtt 6.5 KB
1. Introduction/42. OWASP Top 10.mp4 40.4 MB
1. Introduction/42. OWASP Top 10.vtt 4.1 KB
1. Introduction/43. SQL Injection Prevention.mp4 26.8 MB
1. Introduction/43. SQL Injection Prevention.vtt 5.3 KB
1. Introduction/44. Cross-Site Scripting Prevention.mp4 31.7 MB
1. Introduction/44. Cross-Site Scripting Prevention.vtt 5.1 KB
1. Introduction/45. Cross-Site Request Forgery.mp4 21.5 MB
1. Introduction/45. Cross-Site Request Forgery.vtt 3.5 KB
1. Introduction/46. Understanding Encryption.mp4 28.7 MB
1. Introduction/46. Understanding Encryption.vtt 3.0 KB
1. Introduction/47. Symmetric and Asymmetric Cryptography.mp4 47.8 MB
1. Introduction/47. Symmetric and Asymmetric Cryptography.vtt 8.2 KB
1. Introduction/48. Cryptography Goals.mp4 16.0 MB
1. Introduction/48. Cryptography Goals.vtt 3.1 KB
1. Introduction/49. Codes and Ciphers.mp4 23.2 MB
1. Introduction/49. Codes and Ciphers.vtt 3.8 KB
1. Introduction/4. Digital Signatures and Digital Certificates.mp4 18.6 MB
1. Introduction/4. Digital Signatures and Digital Certificates.vtt 2.8 KB
1. Introduction/50. Key Lifecycle Management.mp4 81.7 MB
1. Introduction/50. Key Lifecycle Management.vtt 13.5 KB
1. Introduction/51. Data Encryption Standards (DES).mp4 24.7 MB
1. Introduction/51. Data Encryption Standards (DES).vtt 4.0 KB
1. Introduction/52. Triple DES (3DES).mp4 32.3 MB
1. Introduction/52. Triple DES (3DES).vtt 3.9 KB
1. Introduction/53. AES, Blowfish, and Twofish.mp4 61.2 MB
1. Introduction/53. AES, Blowfish, and Twofish.vtt 9.4 KB
1. Introduction/54. RC4.mp4 17.9 MB
1. Introduction/54. RC4.vtt 3.2 KB
1. Introduction/55. RSA Encryption.mp4 60.9 MB
1. Introduction/55. RSA Encryption.vtt 8.1 KB
1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.mp4 23.0 MB
1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.vtt 4.2 KB
1. Introduction/57. Key Exchange.mp4 22.8 MB
1. Introduction/57. Key Exchange.vtt 4.3 KB
1. Introduction/58. Diffie-Hellman Key Exchange.mp4 54.3 MB
1. Introduction/58. Diffie-Hellman Key Exchange.vtt 9.5 KB
1. Introduction/59. Key Escrow.mp4 42.9 MB
1. Introduction/59. Key Escrow.vtt 5.0 KB
1. Introduction/5. Availability.mp4 18.9 MB
1. Introduction/5. Availability.vtt 3.3 KB
1. Introduction/60. Trust Models.mp4 22.8 MB
1. Introduction/60. Trust Models.vtt 3.8 KB
1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.mp4 39.2 MB
1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.vtt 5.2 KB
1. Introduction/62. Hash Functions.mp4 32.8 MB
1. Introduction/62. Hash Functions.vtt 3.0 KB
1. Introduction/63. Digital Signatures and Digital Certificates.mp4 18.7 MB
1. Introduction/63. Digital Signatures and Digital Certificates.vtt 2.8 KB
1. Introduction/6. Security Governance.mp4 15.8 MB
1. Introduction/6. Security Governance.vtt 3.2 KB
1. Introduction/7. Organizational Processes.mp4 18.0 MB
1. Introduction/7. Organizational Processes.vtt 3.9 KB
1. Introduction/8. Security Roles and Responsibilities.mp4 14.7 MB
1. Introduction/8. Security Roles and Responsibilities.vtt 2.9 KB
1. Introduction/9. Control Frameworks.mp4 32.2 MB
1. Introduction/9. Control Frameworks.vtt 4.6 KB
Discuss.FreeTutorials.Us.html 165.7 KB
FreeCoursesOnline.Me.html 108.3 KB
FreeTutorials.Eu.html 102.2 KB
How you can help Team-FTU.txt 0.3 KB
[TGx]Downloaded from torrentgalaxy.org.txt 0.5 KB
Torrent Downloaded From GloDls.to.txt 0.1 KB



  • Torrent indexed: 6 years

  • Torrent updated: Saturday 19th of January 2019 12:31:06 PM
  • Torrent hash: 45F66083539E6B153E221895F0EC7C1139AC83B2

  • Torrent size: 2.0 GB

  • Torrent category: Other




Comments



Report suspicious or fake torrent



Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
BTC: 13uHKcvKFUuJvkmX2XbDuxFHueDoqaeBSi