We don't do politics.
  • U: Anonymous
  • D: 2021-03-03 21:01:20
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 XQZT File size CRC
Download
42,907
Stored files
754 58D50B5E
26,629 032F2003
882 8CC8D8AC
RAR-files
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt.rar 150,000,000 65AE1805
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt.r00 150,000,000 09A70048
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt.r01 150,000,000 C45440D6
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt.r02 150,000,000 6696F9F3
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt.r03 150,000,000 75071C65
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt.r04 150,000,000 F751ACC5
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt.r05 150,000,000 D002176F
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt.r06 150,000,000 E3193BF4
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt.r07 22,676,405 D96D3FBB

Total size: 1,222,676,405
Archived files
01.01-security_engineering.mkv [a4f72fd94f64cd38] 15,498,904 8CB36537
01.02-what_you_need_to_know.mkv [cc7e4111b7526175] 1,675,434 294ACA64
01.03-study_resources.mkv [66dcad26983a20be] 10,055,223 B98A92CF
02.01-secure_design_principles.mkv [36eb7a93bde1d90d] 14,541,945 3C00955A
02.02-security_models.mkv [c08cd7eff987bfd0] 15,275,273 B29A5FB7
02.03-security_evaluation_models.mkv [559e5c4035e088c4] 13,370,567 94FC925C
02.04-separation_of_duties.mkv [2fd7d0f44fa36094] 14,891,177 5E6CAD49
02.05-selecting_security_controls.mkv [f202dab823b5895a] 17,830,349 19C474AD
02.06-privacy_by_design.mkv [3d74a35acffa17ed] 11,516,091 50EF6234
02.07-secure_defaults.mkv [278491084b621a73] 15,763,988 D84D1CF3
03.01-what_is_the_cloud.mkv [9cc4ddac0271e0da] 14,998,457 91B37034
03.02-cloud_computing_roles.mkv [287de04e3f2549df] 12,312,110 2F98AD8A
03.03-drivers_for_cloud_computing.mkv [d7c4929acc36bbe4] 11,527,932 CD8F8E81
03.04-multitenant_computing.mkv [9ebcfacf9c4890bc] 8,989,745 EDD27272
03.05-virtualization.mkv [2c4b23608c2be58] 15,991,966 B792ACA6
03.06-desktop_and_application_virtualization.mkv [d213773ded64ae39] 8,507,620 8B94FA90
03.07-cloud_compute_resources.mkv [5819a59480437cf3] 31,077,187 6C8887CB
03.08-containerization.mkv [868c6c1f4ad51d9a] 5,907,863 5D18FFE0
03.09-cloud_activities_and_the_cloud_reference_architecture.mkv [97355e70e58d1e21] 9,533,492 D310A276
03.10-cloud_deployment_models.mkv [c22f8343b90fbb3a] 9,977,970 1B90540E
03.11-cloud_service_categories.mkv [2e5f447377f1d1ce] 20,583,566 0895579D
03.12-edge_and_fog_computing.mkv [139c68a669add7db] 9,409,643 F8C31FD8
04.01-memory_protection.mkv [9998ad91ded840a2] 13,168,529 DF67930B
04.02-hardware_encryption.mkv [14b8bb9d016f875e] 21,881,548 8FC65498
04.03-hardware_and_firmware_security.mkv [c8c397cdea48fcbd] 16,834,478 F9D04679
05.01-server_and_database_security.mkv [126528b853e8aa59] 11,061,399 53FDC573
05.02-nosql_databases.mkv [baa7042418cc80a4] 17,566,112 7A84DFC4
05.03-distributed_and_high_performance_computing.mkv [843653e6e0be7985] 13,739,704 4A47C9A5
06.01-owasp_top_ten.mkv [7ac9f045acb4bb74] 19,355,485 4F09E0F0
06.02-sql_injection_prevention.mkv [77184d48a6f9b157] 12,913,905 F1AAC9B6
06.03-cross-site_scripting_prevention.mkv [5d2233bba335b557] 9,523,814 C1CB02BD
06.04-cross-site_request_forgery_prevention.mkv [653cb757e7de1f03] 13,915,990 5991CD3B
06.05-defending_against_direcotry_traversal.mkv [183bb693b16c6320] 10,212,644 B647502A
06.06-overflow_attacks.mkv [75dcda052d3a2f2d] 13,460,631 89253067
06.07-session_hijacking.mkv [fa3d0f0a4ac3444c] 12,974,106 DADA0FF9
06.08-privilege_escalation.mkv [a88faf83850afed4] 4,835,561 4BC685F1
07.01-industrial_control_systems.mkv [26481e57e2178a41] 18,021,270 E832B70E
07.02-internet_of_things.mkv [bc52d9aa895c4c94] 13,512,028 34799F92
07.03-securing_smart_devices.mkv [e4a2a7735661e8c7] 10,968,716 54E209D1
07.04-secure_networking_for_smart_devices.mkv [d0c3ba6c1544c7f8] 7,920,345 DA9ACEB7
07.05-embedded_systems.mkv [a3153d19c35f9f39] 19,059,310 FF4FF4E0
07.06-communications_for_embedded_devices.mkv [ce7ef2dd43fe86f] 9,539,204 C4B87FDA
08.01-understanding_encryption.mkv [b6a1d2e0f49cc2f2] 8,993,461 34F47DDC
08.02-symmetric_and_asymmetric_cryptography.mkv [3f2fc85d4204577e] 14,266,700 244B8ACD
08.03-goals_of_cryptography.mkv [31d15f2ec43b9303] 13,025,349 DC542D34
08.04-codes_and_ciphers.mkv [6e6d2264f94d1b53] 12,382,779 D84ADC6A
08.05-cryptographic_math.mkv [23cd9d7789ead6dd] 9,197,084 3FA3D65C
08.06-choosing_encryption_algorithms.mkv [1a1ffe789f20d512] 9,503,331 34485826
08.07-the_perfect_encryption_algorithm.mkv [12a3a5285ced3868] 5,994,468 C5154363
08.08-the_cryptographic_lifecycle.mkv [963790a83abb4483] 8,536,544 04B92C88
09.01-data_encryption_standard.mkv [6193e87ad4a0309b] 7,612,566 010F2A75
09.02-3des.mkv [8b11fc3587c49716] 9,407,792 1FD22DE8
09.03-aes_blowfish_and_twofish.mkv [6f21ab8e1c53cc1f] 14,025,445 776BD837
09.04-rc4.mkv [aea255251ebee27f] 5,150,149 8A2583C4
09.05-cipher_modes.mkv [1c7d1084535f189f] 7,807,958 0F12E2E9
09.06-steganography.mkv [ff5110523683f78b] 15,993,676 5A7BEB1C
10.01-rivest_shamir_adelman_(rsa).mkv [e574f8e88ec85cc8] 10,936,392 3E12684E
10.02-pgp_and_gnupg.mkv [3735978c88471008] 35,681,856 8BC2B833
10.03-elliptic-curve_and_quantum_cryptography.mkv [8ffc702377bde87a] 9,492,497 82AD97DA
11.01-key_exchange.mkv [3cc8f19b1d92e449] 8,468,160 7116764D
11.02-diffie-hellman.mkv [bf8bf6e645372a64] 9,677,514 278179CD
11.03-key_escrow.mkv [46c6b566f4289994] 11,921,228 0CE056F0
11.04-key_stretching.mkv [53ac9c41fe9faa93] 5,843,130 C40A3E2E
11.05-hardware_security_modules.mkv [f5dc34109c2e3961] 8,584,216 FA7ABF0B
12.01-trust_models.mkv [1bc2abe0205f1d14] 8,990,464 72CEA93A
12.02-pki_and_digital_certificates.mkv [2ff6aef8bff8c2ff] 14,086,504 CBDBBAC2
12.03-hash_functions.mkv [20b6bf948a3d6904] 18,007,829 4A3B98A6
12.04-digital_signatures.mkv [ea994f0a892ec863] 8,731,997 C16FC249
12.05-digital_signature_standard.mkv [7aa8a0169708714d] 13,920,166 60AC5927
12.06-create_a_digital_certificate.mkv [216b7ae35202aaf2] 12,856,630 5685059F
12.07-revoke_a_digital_certificate.mkv [5a0740381531f62f] 6,091,638 94A53E1E
12.08-certificate_stapling.mkv [268ab9c8da1e60fa] 5,844,792 4B01114E
12.09-certificate_authorities.mkv [3b54e68311caee1b] 17,091,617 0604FD19
12.10-certificate_subjects.mkv [eec0f92057bd7] 13,279,012 2E4FB67D
12.11-certificate_types.mkv [daf9dae6b60b6290] 8,714,763 C8091608
12.12-certificate_formats.mkv [e821393ff7e330e1] 12,703,804 BCB7365D
13.01-brute_force_attacks.mkv [8322658c13fdbf78] 10,446,137 33B86EF4
13.02-knowledge-based_attacks.mkv [cda545938f562e37] 8,923,506 488E16B5
13.03-eavesdropping_attacks.mkv [ea5f5a7a6adbdb8] 10,221,206 E8FDCA4F
13.04-implementation_attacks.mkv [e386576af60f7c70] 6,824,446 67A88A7C
13.05-limitations_of_encryption_algorithms.mkv [465a226bfb913738] 11,203,496 9E685CE8
13.06-ransomware.mkv [30d421ece216abb6] 26,899,523 EE7077DB
14.01-site_and_facility_design.mkv [9940df776ecad60b] 15,325,301 75E9A156
14.02-data_center_environmental_controls.mkv [6b4ba1acc86169aa] 17,108,599 6964D0C5
14.03-data_center_environmental_protection.mkv [2fb795b9311506a3] 23,749,055 24543BAF
14.04-power_control.mkv [127e582da5725a1c] 10,585,178 DD165C20
14.05-physical_access_control.mkv [917df9d2ed94e49e] 25,324,432 16641AF2
14.06-visitor_management.mkv [bd4ce6b5ee9497fd] 7,061,544 597F3464
14.07-physical_security_personnel.mkv [bc2634cbfb1184c1] 10,684,186 79ACC3D8
15.01-threat_intelligence.mkv [e86c1d8455e45fcc] 13,279,224 1C29AB64
15.02-managing_threat_indicators.mkv [359c8444b756eecb] 15,966,450 B313D453
15.03-intelligence_sharing.mkv [adc65761b9e47346] 12,511,628 16B57C0A
15.04-threat_research.mkv [e22871824c4f2ed3] 6,492,771 0382F478
15.05-identifying_threats.mkv [b338cacb9db07973] 5,327,276 9AE12F36
15.06-automating_threat_intelligence.mkv [27f6947662b00e47] 15,257,355 FE4EEDF0
15.07-threat_hunting.mkv [fcd5c91273b25886] 13,422,888 DABBFCD6
16.01-soap_and_rest.mkv [bde4b7d5c949f163] 6,130,602 A8E468A8
16.02-soa_and_microservices.mkv [79bf8504824d5483] 5,478,097 8F8C0290
17.01-continuing_your_preparation.mkv [374acada0ceec5e9] 1,922,941 9858A883

Total size: 1,222,668,633
Video files
Sample
linkedin.learning.cissp.cert.prep.2021.3.security.architecture.and.engineering-xqzt-sample.mkv 4,551,802 EBE26CE0
RAR Recovery
Not Present
Labels UNKNOWN