RAR-files |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.rar |
200,000,000 |
B14EEA67 |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r00 |
200,000,000 |
CBAC27F8 |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r01 |
200,000,000 |
B2ED82FC |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r02 |
200,000,000 |
38ED3DD5 |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r03 |
200,000,000 |
0CB3ECFA |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r04 |
200,000,000 |
841CF28D |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r05 |
200,000,000 |
BDEB338E |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r06 |
200,000,000 |
44193A05 |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r07 |
200,000,000 |
A5E99551 |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r08 |
200,000,000 |
899F4CBB |
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r09 |
108,491,743 |
1F488EC9 |
|
Total size: |
2,108,491,743 |
|
|
Archived
files |
01.01-cybersecurity.mkv
[f39d8af2e89596f7]
|
34,253,387 |
528C6742 |
01.02-what_you_should_know.mkv
[963c752d9a3b948]
|
6,984,628 |
9DECF663 |
02.01-the_elcc_exam.mkv
[3f6e7f8c545d592a]
|
46,685,832 |
BA9396E6 |
02.02-careers_in_information_security.mkv
[ea9c27a455a81f82]
|
75,756,429 |
B0B2AA35 |
02.03-the_value_of_certification.mkv
[567dccb1d1982a11]
|
7,249,047 |
0F672F06 |
02.04-(isc)2_code_of_ethics.mkv
[fcb8381f460b9aa9]
|
5,357,225 |
F424BDD3 |
03.01-confidentiality.mkv
[f2f4eaead4bc8b72]
|
53,247,758 |
16253CF6 |
03.02-integrity.mkv
[6970d27ed4fdea90]
|
38,035,879 |
CDDE60A6 |
03.03-availability.mkv
[a14261890de97152]
|
59,745,750 |
E6C1E89C |
03.04-authentication_and_authorization.mkv
[13b7ae6b1387f7fa]
|
45,619,642 |
2CBAA03D |
03.05-password_security.mkv
[3305bb10a070e919]
|
42,478,299 |
7677C966 |
03.06-multifactor_authentication.mkv
[37cf9541a3d6f5a9]
|
55,039,460 |
A1CD9D7E |
03.07-non-repudiation.mkv
[ec0a9a48bdbabd6f]
|
18,893,706 |
0655AC40 |
03.08-privacy.mkv
[b77f53449a87b490]
|
49,291,446 |
D8AA996F |
04.01-understanding_risks.mkv
[e05d813c69ae3ae4]
|
36,230,900 |
D75F5353 |
04.02-risk_assessment.mkv
[b25b0348f9fd5e14]
|
64,533,043 |
A179F593 |
04.03-risk_treatment.mkv
[fe97377b5fc3da01]
|
52,947,427 |
FF141388 |
04.04-selecting_security_controls.mkv
[517268d33a3dd55]
|
65,797,396 |
EC8D090C |
04.05-configuration_management.mkv
[d16efa8cd8be477]
|
4,653,940 |
5CD9AC24 |
05.01-regulations_and_laws.mkv
[f157ce141c52010f]
|
25,683,189 |
B01D464B |
05.02-security_policy_framework.mkv
[f065260de81918c5]
|
76,469,904 |
161F0809 |
05.03-best_practice_security_policies.mkv
[7cdaf414d39ca666]
|
41,444,224 |
A153C236 |
06.01-business_continuity_planning.mkv
[8be51291690c3993]
|
7,392,243 |
4726A7D4 |
06.02-business_continuity_controls.mkv
[765e0a57e49ecec3]
|
8,775,440 |
EA6CA825 |
06.03-high_availability_and_fault_tolerance.mkv
[6f82ad7061c7ca4]
|
11,875,556 |
4F45BCB0 |
07.01-build_an_incident_response_program.mkv
[9707e50bb9638ed3]
|
11,522,456 |
E1451871 |
07.02-create_an_incident_response_team.mkv
[bc94480034070177]
|
29,068,686 |
AC1BF6AA |
07.03-incident_communications_plan.mkv
[24705408fa2381e9]
|
52,215,407 |
BCB6A459 |
07.04-incident_identification.mkv
[3598baa739572adf]
|
10,639,910 |
AB2B26E6 |
08.01-disaster_recovery_planning.mkv
[53141a532c09006e]
|
58,190,885 |
3D8A10B8 |
08.02-backups.mkv
[1f59467b097b19c0]
|
8,975,187 |
C902EE71 |
08.03-disaster_recovery_sites.mkv
[52063d3980110268]
|
9,806,297 |
83B9831F |
08.04-test_bcdr_plans.mkv
[29b1c7acd0191cbe]
|
9,124,086 |
100F8092 |
09.01-control_physical_access.mkv
[cd55385c589519e6]
|
9,733,297 |
03838AD5 |
09.02-design_for_physical_security.mkv
[346403f478f6aeee]
|
47,099,177 |
042BF1E9 |
09.03-visitor_management.mkv
[8f89e245dea22124]
|
4,185,249 |
4F47874C |
09.04-physical_security_personnel.mkv
[9482279d9765b1cb]
|
5,711,202 |
C5E5AAEB |
10.01-account_and_privilege_management.mkv
[cae1320cf9d24ddf]
|
30,839,424 |
D4A5523E |
10.02-account_monitoring.mkv
[80c4d759ef517fdc]
|
40,216,192 |
A05FA8F7 |
10.03-provisioning_and_deprovisioning.mkv
[185388a00d61913e]
|
9,019,326 |
000B676D |
10.04-authorization.mkv
[942c2e8e53f740a2]
|
52,403,237 |
9AE33F7F |
11.01-network_types.mkv
[ad1c26ebbaaebc7]
|
79,440,615 |
36777AA7 |
11.02-introducing_tcpip.mkv
[b3832e147fb7aba0]
|
13,616,944 |
8FDD7762 |
11.03-ip_addresses_and_dhcp.mkv
[d38e5df23973476]
|
9,053,653 |
2D2C12AD |
11.04-network_ports.mkv
[f5fad16dae2fae0f]
|
8,250,448 |
31B5559D |
11.05-securing_wireless_networks.mkv
[82c1073f7e3e7092]
|
50,653,734 |
2A35672E |
11.06-wireless_encryption.mkv
[17f5f79b3a6ccfe]
|
37,056,386 |
C0D3396B |
11.07-ping_and_traceroute.mkv
[df54319231135b8f]
|
14,291,464 |
A1EB5A97 |
12.01-viruses_worms_and_trojans.mkv
[15436e9908145016]
|
84,628,128 |
9562A4F0 |
12.02-botnets.mkv
[cca98a392155ace3]
|
6,365,732 |
AFB793B6 |
12.03-eavesdropping_attacks.mkv
[67653974aa8ed5b2]
|
8,757,087 |
52CF8D56 |
12.04-implementation_attacks.mkv
[81711ae2af26af90]
|
2,728,484 |
9286562A |
13.01-intrusion_detection_and_prevention.mkv
[9928c745e619e097]
|
11,633,520 |
B819A8F9 |
13.02-malware_prevention.mkv
[7d62ca9f55eb870b]
|
6,109,826 |
86F44186 |
13.03-port_scanners.mkv
[c16a23781a099d8f]
|
6,935,835 |
2A804898 |
13.04-vulnerability_scanners.mkv
[440f2d6c747306c0]
|
5,421,293 |
D3514443 |
14.01-data_center_protection.mkv
[deaa419dbc2e2cca]
|
65,893,482 |
1A9F322D |
14.02-security_zones.mkv
[a5d929cd83d57d91]
|
8,197,114 |
C75B6C33 |
14.03-routers_and_switches.mkv
[b994e6a84a775304]
|
7,696,954 |
B73628D6 |
14.04-vlans_and_network_segmentation.mkv
[84dac1835f31a09]
|
30,661,522 |
BF6B100D |
14.05-firewalls.mkv
[1e575bf34e502a01]
|
13,763,001 |
0AABD1AC |
14.06-vpns_and_vpn_concentrators.mkv
[472814da8da75dc3]
|
10,802,045 |
8F0C8118 |
14.07-network_access_control.mkv
[5c25498d31298d46]
|
10,063,245 |
DB43E35C |
14.08-internet_of_things.mkv
[28348efa823f7a8b]
|
27,835,465 |
96844957 |
14.09-securing_iot_devices.mkv
[8b94dcacd010f549]
|
5,562,152 |
2C11706C |
14.10-network_security_for_smart_devices.mkv
[cd97d9045bb9ee72]
|
4,130,085 |
1AC8BD4E |
15.01-what_is_the_cloud.mkv
[ac83b81b5cb4ef71]
|
9,890,671 |
5372976F |
15.02-cloud_service_categories.mkv
[85ea626aa54f911]
|
6,648,063 |
B99086FB |
15.03-cloud_deployment_models.mkv
[5ddaa2f2b2c0750b]
|
5,563,918 |
042543D9 |
15.04-managed_security_service_providers.mkv
[23668b36f965ba54]
|
6,568,910 |
99E2896C |
15.05-manage_vendor_relationships.mkv
[62d55d01f8c3954]
|
9,817,767 |
640EAB00 |
15.06-vendor_agreements.mkv
[8ab0ad5692dcaa17]
|
10,037,696 |
C47E6DD9 |
16.01-understanding_encryption.mkv
[65feea993b34a4ae]
|
40,271,603 |
F04FAFBD |
16.02-symmetric_vs._asymmetric_cryptography.mkv
[3d9789055ed6e3e0]
|
79,317,716 |
C96ADBFD |
16.03-hash_functions.mkv
[859c1cea2325f142]
|
16,637,560 |
B3DE2BD7 |
16.04-the_data_lifecycle.mkv
[af82a96b72f98db6]
|
9,694,509 |
E3E9E47B |
16.05-data_classification.mkv
[ee4f96a18cafdbeb]
|
5,915,022 |
617DAAF4 |
16.06-logging_and_monitoring.mkv
[5d2f355077e26552]
|
7,532,676 |
FE0CE2E6 |
17.01-social_engineering.mkv
[a996ae1b4110ac24]
|
13,324,118 |
EB277E6A |
17.02-impersonation_attacks.mkv
[4749ac2c7075e9ea]
|
10,759,771 |
121F6FC2 |
17.03-security_awareness_training.mkv
[d069945858c0e9f4]
|
14,624,688 |
3E24A807 |
18.01-get_ready_for_the_exam.mkv
[53bff6f80dde90a1]
|
9,140,304 |
A620440B |
|
Total size: |
2,108,484,974 |
|
|