Archived
files |
01.01-security_engineering.mkv
[a4f72fd94f64cd38]
|
15,498,904 |
8CB36537 |
01.02-what_you_need_to_know.mkv
[cc7e4111b7526175]
|
1,675,434 |
294ACA64 |
01.03-study_resources.mkv
[66dcad26983a20be]
|
10,055,223 |
B98A92CF |
02.01-secure_design_principles.mkv
[36eb7a93bde1d90d]
|
14,541,945 |
3C00955A |
02.02-security_models.mkv
[c08cd7eff987bfd0]
|
15,275,273 |
B29A5FB7 |
02.03-security_evaluation_models.mkv
[559e5c4035e088c4]
|
13,370,567 |
94FC925C |
02.04-separation_of_duties.mkv
[2fd7d0f44fa36094]
|
14,891,177 |
5E6CAD49 |
02.05-selecting_security_controls.mkv
[f202dab823b5895a]
|
17,830,349 |
19C474AD |
02.06-privacy_by_design.mkv
[3d74a35acffa17ed]
|
11,516,091 |
50EF6234 |
02.07-secure_defaults.mkv
[278491084b621a73]
|
15,763,988 |
D84D1CF3 |
03.01-what_is_the_cloud.mkv
[9cc4ddac0271e0da]
|
14,998,457 |
91B37034 |
03.02-cloud_computing_roles.mkv
[287de04e3f2549df]
|
12,312,110 |
2F98AD8A |
03.03-drivers_for_cloud_computing.mkv
[d7c4929acc36bbe4]
|
11,527,932 |
CD8F8E81 |
03.04-multitenant_computing.mkv
[9ebcfacf9c4890bc]
|
8,989,745 |
EDD27272 |
03.05-virtualization.mkv
[2c4b23608c2be58]
|
15,991,966 |
B792ACA6 |
03.06-desktop_and_application_virtualization.mkv
[d213773ded64ae39]
|
8,507,620 |
8B94FA90 |
03.07-cloud_compute_resources.mkv
[5819a59480437cf3]
|
31,077,187 |
6C8887CB |
03.08-containerization.mkv
[868c6c1f4ad51d9a]
|
5,907,863 |
5D18FFE0 |
03.09-cloud_activities_and_the_cloud_reference_architecture.mkv
[97355e70e58d1e21]
|
9,533,492 |
D310A276 |
03.10-cloud_deployment_models.mkv
[c22f8343b90fbb3a]
|
9,977,970 |
1B90540E |
03.11-cloud_service_categories.mkv
[2e5f447377f1d1ce]
|
20,583,566 |
0895579D |
03.12-edge_and_fog_computing.mkv
[139c68a669add7db]
|
9,409,643 |
F8C31FD8 |
04.01-memory_protection.mkv
[9998ad91ded840a2]
|
13,168,529 |
DF67930B |
04.02-hardware_encryption.mkv
[14b8bb9d016f875e]
|
21,881,548 |
8FC65498 |
04.03-hardware_and_firmware_security.mkv
[c8c397cdea48fcbd]
|
16,834,478 |
F9D04679 |
05.01-server_and_database_security.mkv
[126528b853e8aa59]
|
11,061,399 |
53FDC573 |
05.02-nosql_databases.mkv
[baa7042418cc80a4]
|
17,566,112 |
7A84DFC4 |
05.03-distributed_and_high_performance_computing.mkv
[843653e6e0be7985]
|
13,739,704 |
4A47C9A5 |
06.01-owasp_top_ten.mkv
[7ac9f045acb4bb74]
|
19,355,485 |
4F09E0F0 |
06.02-sql_injection_prevention.mkv
[77184d48a6f9b157]
|
12,913,905 |
F1AAC9B6 |
06.03-cross-site_scripting_prevention.mkv
[5d2233bba335b557]
|
9,523,814 |
C1CB02BD |
06.04-cross-site_request_forgery_prevention.mkv
[653cb757e7de1f03]
|
13,915,990 |
5991CD3B |
06.05-defending_against_direcotry_traversal.mkv
[183bb693b16c6320]
|
10,212,644 |
B647502A |
06.06-overflow_attacks.mkv
[75dcda052d3a2f2d]
|
13,460,631 |
89253067 |
06.07-session_hijacking.mkv
[fa3d0f0a4ac3444c]
|
12,974,106 |
DADA0FF9 |
06.08-privilege_escalation.mkv
[a88faf83850afed4]
|
4,835,561 |
4BC685F1 |
07.01-industrial_control_systems.mkv
[26481e57e2178a41]
|
18,021,270 |
E832B70E |
07.02-internet_of_things.mkv
[bc52d9aa895c4c94]
|
13,512,028 |
34799F92 |
07.03-securing_smart_devices.mkv
[e4a2a7735661e8c7]
|
10,968,716 |
54E209D1 |
07.04-secure_networking_for_smart_devices.mkv
[d0c3ba6c1544c7f8]
|
7,920,345 |
DA9ACEB7 |
07.05-embedded_systems.mkv
[a3153d19c35f9f39]
|
19,059,310 |
FF4FF4E0 |
07.06-communications_for_embedded_devices.mkv
[ce7ef2dd43fe86f]
|
9,539,204 |
C4B87FDA |
08.01-understanding_encryption.mkv
[b6a1d2e0f49cc2f2]
|
8,993,461 |
34F47DDC |
08.02-symmetric_and_asymmetric_cryptography.mkv
[3f2fc85d4204577e]
|
14,266,700 |
244B8ACD |
08.03-goals_of_cryptography.mkv
[31d15f2ec43b9303]
|
13,025,349 |
DC542D34 |
08.04-codes_and_ciphers.mkv
[6e6d2264f94d1b53]
|
12,382,779 |
D84ADC6A |
08.05-cryptographic_math.mkv
[23cd9d7789ead6dd]
|
9,197,084 |
3FA3D65C |
08.06-choosing_encryption_algorithms.mkv
[1a1ffe789f20d512]
|
9,503,331 |
34485826 |
08.07-the_perfect_encryption_algorithm.mkv
[12a3a5285ced3868]
|
5,994,468 |
C5154363 |
08.08-the_cryptographic_lifecycle.mkv
[963790a83abb4483]
|
8,536,544 |
04B92C88 |
09.01-data_encryption_standard.mkv
[6193e87ad4a0309b]
|
7,612,566 |
010F2A75 |
09.02-3des.mkv
[8b11fc3587c49716]
|
9,407,792 |
1FD22DE8 |
09.03-aes_blowfish_and_twofish.mkv
[6f21ab8e1c53cc1f]
|
14,025,445 |
776BD837 |
09.04-rc4.mkv
[aea255251ebee27f]
|
5,150,149 |
8A2583C4 |
09.05-cipher_modes.mkv
[1c7d1084535f189f]
|
7,807,958 |
0F12E2E9 |
09.06-steganography.mkv
[ff5110523683f78b]
|
15,993,676 |
5A7BEB1C |
10.01-rivest_shamir_adelman_(rsa).mkv
[e574f8e88ec85cc8]
|
10,936,392 |
3E12684E |
10.02-pgp_and_gnupg.mkv
[3735978c88471008]
|
35,681,856 |
8BC2B833 |
10.03-elliptic-curve_and_quantum_cryptography.mkv
[8ffc702377bde87a]
|
9,492,497 |
82AD97DA |
11.01-key_exchange.mkv
[3cc8f19b1d92e449]
|
8,468,160 |
7116764D |
11.02-diffie-hellman.mkv
[bf8bf6e645372a64]
|
9,677,514 |
278179CD |
11.03-key_escrow.mkv
[46c6b566f4289994]
|
11,921,228 |
0CE056F0 |
11.04-key_stretching.mkv
[53ac9c41fe9faa93]
|
5,843,130 |
C40A3E2E |
11.05-hardware_security_modules.mkv
[f5dc34109c2e3961]
|
8,584,216 |
FA7ABF0B |
12.01-trust_models.mkv
[1bc2abe0205f1d14]
|
8,990,464 |
72CEA93A |
12.02-pki_and_digital_certificates.mkv
[2ff6aef8bff8c2ff]
|
14,086,504 |
CBDBBAC2 |
12.03-hash_functions.mkv
[20b6bf948a3d6904]
|
18,007,829 |
4A3B98A6 |
12.04-digital_signatures.mkv
[ea994f0a892ec863]
|
8,731,997 |
C16FC249 |
12.05-digital_signature_standard.mkv
[7aa8a0169708714d]
|
13,920,166 |
60AC5927 |
12.06-create_a_digital_certificate.mkv
[216b7ae35202aaf2]
|
12,856,630 |
5685059F |
12.07-revoke_a_digital_certificate.mkv
[5a0740381531f62f]
|
6,091,638 |
94A53E1E |
12.08-certificate_stapling.mkv
[268ab9c8da1e60fa]
|
5,844,792 |
4B01114E |
12.09-certificate_authorities.mkv
[3b54e68311caee1b]
|
17,091,617 |
0604FD19 |
12.10-certificate_subjects.mkv
[eec0f92057bd7]
|
13,279,012 |
2E4FB67D |
12.11-certificate_types.mkv
[daf9dae6b60b6290]
|
8,714,763 |
C8091608 |
12.12-certificate_formats.mkv
[e821393ff7e330e1]
|
12,703,804 |
BCB7365D |
13.01-brute_force_attacks.mkv
[8322658c13fdbf78]
|
10,446,137 |
33B86EF4 |
13.02-knowledge-based_attacks.mkv
[cda545938f562e37]
|
8,923,506 |
488E16B5 |
13.03-eavesdropping_attacks.mkv
[ea5f5a7a6adbdb8]
|
10,221,206 |
E8FDCA4F |
13.04-implementation_attacks.mkv
[e386576af60f7c70]
|
6,824,446 |
67A88A7C |
13.05-limitations_of_encryption_algorithms.mkv
[465a226bfb913738]
|
11,203,496 |
9E685CE8 |
13.06-ransomware.mkv
[30d421ece216abb6]
|
26,899,523 |
EE7077DB |
14.01-site_and_facility_design.mkv
[9940df776ecad60b]
|
15,325,301 |
75E9A156 |
14.02-data_center_environmental_controls.mkv
[6b4ba1acc86169aa]
|
17,108,599 |
6964D0C5 |
14.03-data_center_environmental_protection.mkv
[2fb795b9311506a3]
|
23,749,055 |
24543BAF |
14.04-power_control.mkv
[127e582da5725a1c]
|
10,585,178 |
DD165C20 |
14.05-physical_access_control.mkv
[917df9d2ed94e49e]
|
25,324,432 |
16641AF2 |
14.06-visitor_management.mkv
[bd4ce6b5ee9497fd]
|
7,061,544 |
597F3464 |
14.07-physical_security_personnel.mkv
[bc2634cbfb1184c1]
|
10,684,186 |
79ACC3D8 |
15.01-threat_intelligence.mkv
[e86c1d8455e45fcc]
|
13,279,224 |
1C29AB64 |
15.02-managing_threat_indicators.mkv
[359c8444b756eecb]
|
15,966,450 |
B313D453 |
15.03-intelligence_sharing.mkv
[adc65761b9e47346]
|
12,511,628 |
16B57C0A |
15.04-threat_research.mkv
[e22871824c4f2ed3]
|
6,492,771 |
0382F478 |
15.05-identifying_threats.mkv
[b338cacb9db07973]
|
5,327,276 |
9AE12F36 |
15.06-automating_threat_intelligence.mkv
[27f6947662b00e47]
|
15,257,355 |
FE4EEDF0 |
15.07-threat_hunting.mkv
[fcd5c91273b25886]
|
13,422,888 |
DABBFCD6 |
16.01-soap_and_rest.mkv
[bde4b7d5c949f163]
|
6,130,602 |
A8E468A8 |
16.02-soa_and_microservices.mkv
[79bf8504824d5483]
|
5,478,097 |
8F8C0290 |
17.01-continuing_your_preparation.mkv
[374acada0ceec5e9]
|
1,922,941 |
9858A883 |
|
Total size: |
1,222,668,633 |
|
|