Our releases are made for sharing, not to sitting by ourselves
jerking off to... ―dSS
  • U: Anonymous
  • D: 2022-09-26 20:23:11
  • C: Unknown
This file is unconfirmed

RELEASE >

ReScene version pyReScene Auto 0.7 XQZT File size CRC
Download
39,403
Stored files
604 57E9D51E
25,388 C85A2136
869 84B71069
RAR-files
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.rar 200,000,000 B14EEA67
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r00 200,000,000 CBAC27F8
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r01 200,000,000 B2ED82FC
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r02 200,000,000 38ED3DD5
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r03 200,000,000 0CB3ECFA
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r04 200,000,000 841CF28D
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r05 200,000,000 BDEB338E
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r06 200,000,000 44193A05
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r07 200,000,000 A5E99551
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r08 200,000,000 899F4CBB
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt.r09 108,491,743 1F488EC9

Total size: 2,108,491,743
Archived files
01.01-cybersecurity.mkv [f39d8af2e89596f7] 34,253,387 528C6742
01.02-what_you_should_know.mkv [963c752d9a3b948] 6,984,628 9DECF663
02.01-the_elcc_exam.mkv [3f6e7f8c545d592a] 46,685,832 BA9396E6
02.02-careers_in_information_security.mkv [ea9c27a455a81f82] 75,756,429 B0B2AA35
02.03-the_value_of_certification.mkv [567dccb1d1982a11] 7,249,047 0F672F06
02.04-(isc)2_code_of_ethics.mkv [fcb8381f460b9aa9] 5,357,225 F424BDD3
03.01-confidentiality.mkv [f2f4eaead4bc8b72] 53,247,758 16253CF6
03.02-integrity.mkv [6970d27ed4fdea90] 38,035,879 CDDE60A6
03.03-availability.mkv [a14261890de97152] 59,745,750 E6C1E89C
03.04-authentication_and_authorization.mkv [13b7ae6b1387f7fa] 45,619,642 2CBAA03D
03.05-password_security.mkv [3305bb10a070e919] 42,478,299 7677C966
03.06-multifactor_authentication.mkv [37cf9541a3d6f5a9] 55,039,460 A1CD9D7E
03.07-non-repudiation.mkv [ec0a9a48bdbabd6f] 18,893,706 0655AC40
03.08-privacy.mkv [b77f53449a87b490] 49,291,446 D8AA996F
04.01-understanding_risks.mkv [e05d813c69ae3ae4] 36,230,900 D75F5353
04.02-risk_assessment.mkv [b25b0348f9fd5e14] 64,533,043 A179F593
04.03-risk_treatment.mkv [fe97377b5fc3da01] 52,947,427 FF141388
04.04-selecting_security_controls.mkv [517268d33a3dd55] 65,797,396 EC8D090C
04.05-configuration_management.mkv [d16efa8cd8be477] 4,653,940 5CD9AC24
05.01-regulations_and_laws.mkv [f157ce141c52010f] 25,683,189 B01D464B
05.02-security_policy_framework.mkv [f065260de81918c5] 76,469,904 161F0809
05.03-best_practice_security_policies.mkv [7cdaf414d39ca666] 41,444,224 A153C236
06.01-business_continuity_planning.mkv [8be51291690c3993] 7,392,243 4726A7D4
06.02-business_continuity_controls.mkv [765e0a57e49ecec3] 8,775,440 EA6CA825
06.03-high_availability_and_fault_tolerance.mkv [6f82ad7061c7ca4] 11,875,556 4F45BCB0
07.01-build_an_incident_response_program.mkv [9707e50bb9638ed3] 11,522,456 E1451871
07.02-create_an_incident_response_team.mkv [bc94480034070177] 29,068,686 AC1BF6AA
07.03-incident_communications_plan.mkv [24705408fa2381e9] 52,215,407 BCB6A459
07.04-incident_identification.mkv [3598baa739572adf] 10,639,910 AB2B26E6
08.01-disaster_recovery_planning.mkv [53141a532c09006e] 58,190,885 3D8A10B8
08.02-backups.mkv [1f59467b097b19c0] 8,975,187 C902EE71
08.03-disaster_recovery_sites.mkv [52063d3980110268] 9,806,297 83B9831F
08.04-test_bcdr_plans.mkv [29b1c7acd0191cbe] 9,124,086 100F8092
09.01-control_physical_access.mkv [cd55385c589519e6] 9,733,297 03838AD5
09.02-design_for_physical_security.mkv [346403f478f6aeee] 47,099,177 042BF1E9
09.03-visitor_management.mkv [8f89e245dea22124] 4,185,249 4F47874C
09.04-physical_security_personnel.mkv [9482279d9765b1cb] 5,711,202 C5E5AAEB
10.01-account_and_privilege_management.mkv [cae1320cf9d24ddf] 30,839,424 D4A5523E
10.02-account_monitoring.mkv [80c4d759ef517fdc] 40,216,192 A05FA8F7
10.03-provisioning_and_deprovisioning.mkv [185388a00d61913e] 9,019,326 000B676D
10.04-authorization.mkv [942c2e8e53f740a2] 52,403,237 9AE33F7F
11.01-network_types.mkv [ad1c26ebbaaebc7] 79,440,615 36777AA7
11.02-introducing_tcpip.mkv [b3832e147fb7aba0] 13,616,944 8FDD7762
11.03-ip_addresses_and_dhcp.mkv [d38e5df23973476] 9,053,653 2D2C12AD
11.04-network_ports.mkv [f5fad16dae2fae0f] 8,250,448 31B5559D
11.05-securing_wireless_networks.mkv [82c1073f7e3e7092] 50,653,734 2A35672E
11.06-wireless_encryption.mkv [17f5f79b3a6ccfe] 37,056,386 C0D3396B
11.07-ping_and_traceroute.mkv [df54319231135b8f] 14,291,464 A1EB5A97
12.01-viruses_worms_and_trojans.mkv [15436e9908145016] 84,628,128 9562A4F0
12.02-botnets.mkv [cca98a392155ace3] 6,365,732 AFB793B6
12.03-eavesdropping_attacks.mkv [67653974aa8ed5b2] 8,757,087 52CF8D56
12.04-implementation_attacks.mkv [81711ae2af26af90] 2,728,484 9286562A
13.01-intrusion_detection_and_prevention.mkv [9928c745e619e097] 11,633,520 B819A8F9
13.02-malware_prevention.mkv [7d62ca9f55eb870b] 6,109,826 86F44186
13.03-port_scanners.mkv [c16a23781a099d8f] 6,935,835 2A804898
13.04-vulnerability_scanners.mkv [440f2d6c747306c0] 5,421,293 D3514443
14.01-data_center_protection.mkv [deaa419dbc2e2cca] 65,893,482 1A9F322D
14.02-security_zones.mkv [a5d929cd83d57d91] 8,197,114 C75B6C33
14.03-routers_and_switches.mkv [b994e6a84a775304] 7,696,954 B73628D6
14.04-vlans_and_network_segmentation.mkv [84dac1835f31a09] 30,661,522 BF6B100D
14.05-firewalls.mkv [1e575bf34e502a01] 13,763,001 0AABD1AC
14.06-vpns_and_vpn_concentrators.mkv [472814da8da75dc3] 10,802,045 8F0C8118
14.07-network_access_control.mkv [5c25498d31298d46] 10,063,245 DB43E35C
14.08-internet_of_things.mkv [28348efa823f7a8b] 27,835,465 96844957
14.09-securing_iot_devices.mkv [8b94dcacd010f549] 5,562,152 2C11706C
14.10-network_security_for_smart_devices.mkv [cd97d9045bb9ee72] 4,130,085 1AC8BD4E
15.01-what_is_the_cloud.mkv [ac83b81b5cb4ef71] 9,890,671 5372976F
15.02-cloud_service_categories.mkv [85ea626aa54f911] 6,648,063 B99086FB
15.03-cloud_deployment_models.mkv [5ddaa2f2b2c0750b] 5,563,918 042543D9
15.04-managed_security_service_providers.mkv [23668b36f965ba54] 6,568,910 99E2896C
15.05-manage_vendor_relationships.mkv [62d55d01f8c3954] 9,817,767 640EAB00
15.06-vendor_agreements.mkv [8ab0ad5692dcaa17] 10,037,696 C47E6DD9
16.01-understanding_encryption.mkv [65feea993b34a4ae] 40,271,603 F04FAFBD
16.02-symmetric_vs._asymmetric_cryptography.mkv [3d9789055ed6e3e0] 79,317,716 C96ADBFD
16.03-hash_functions.mkv [859c1cea2325f142] 16,637,560 B3DE2BD7
16.04-the_data_lifecycle.mkv [af82a96b72f98db6] 9,694,509 E3E9E47B
16.05-data_classification.mkv [ee4f96a18cafdbeb] 5,915,022 617DAAF4
16.06-logging_and_monitoring.mkv [5d2f355077e26552] 7,532,676 FE0CE2E6
17.01-social_engineering.mkv [a996ae1b4110ac24] 13,324,118 EB277E6A
17.02-impersonation_attacks.mkv [4749ac2c7075e9ea] 10,759,771 121F6FC2
17.03-security_awareness_training.mkv [d069945858c0e9f4] 14,624,688 3E24A807
18.01-get_ready_for_the_exam.mkv [53bff6f80dde90a1] 9,140,304 A620440B

Total size: 2,108,484,974
Video files
Sample
linkedin.learning.cert.prep.isc2.certified.in.cybersecurity-xqzt-sample.mkv 2,517,486 6B25DB02
RAR Recovery
Not Present
Labels UNKNOWN