RAR-files |
linkedin.learning.giac.security.essentials.gsec-xqzt.rar |
600,000,000 |
38F9CEC5 |
linkedin.learning.giac.security.essentials.gsec-xqzt.r00 |
600,000,000 |
2374E1EB |
linkedin.learning.giac.security.essentials.gsec-xqzt.r01 |
600,000,000 |
133A57FA |
linkedin.learning.giac.security.essentials.gsec-xqzt.r02 |
600,000,000 |
4C5632BA |
linkedin.learning.giac.security.essentials.gsec-xqzt.r03 |
600,000,000 |
B6EF24B3 |
linkedin.learning.giac.security.essentials.gsec-xqzt.r04 |
600,000,000 |
2B1EE5A8 |
linkedin.learning.giac.security.essentials.gsec-xqzt.r05 |
600,000,000 |
5738CB44 |
linkedin.learning.giac.security.essentials.gsec-xqzt.r06 |
600,000,000 |
4665AEA6 |
linkedin.learning.giac.security.essentials.gsec-xqzt.r07 |
600,000,000 |
F9937794 |
linkedin.learning.giac.security.essentials.gsec-xqzt.r08 |
600,000,000 |
14F003BC |
linkedin.learning.giac.security.essentials.gsec-xqzt.r09 |
600,000,000 |
AE9CE0EB |
linkedin.learning.giac.security.essentials.gsec-xqzt.r10 |
600,000,000 |
D99B200E |
linkedin.learning.giac.security.essentials.gsec-xqzt.r11 |
600,000,000 |
5C28E3F5 |
linkedin.learning.giac.security.essentials.gsec-xqzt.r12 |
600,000,000 |
7E8EAA0F |
linkedin.learning.giac.security.essentials.gsec-xqzt.r13 |
600,000,000 |
B04C44DA |
linkedin.learning.giac.security.essentials.gsec-xqzt.r14 |
600,000,000 |
B1D7319A |
linkedin.learning.giac.security.essentials.gsec-xqzt.r15 |
600,000,000 |
A0C1352F |
linkedin.learning.giac.security.essentials.gsec-xqzt.r16 |
600,000,000 |
4FD69B4C |
linkedin.learning.giac.security.essentials.gsec-xqzt.r17 |
600,000,000 |
C56B6202 |
linkedin.learning.giac.security.essentials.gsec-xqzt.r18 |
600,000,000 |
ECD8B89D |
linkedin.learning.giac.security.essentials.gsec-xqzt.r19 |
600,000,000 |
6A9EBDC9 |
linkedin.learning.giac.security.essentials.gsec-xqzt.r20 |
240,232,931 |
DA06C8AA |
|
Total size: |
12,840,232,931 |
|
|
Archived
files |
01.01-giac_security_essentials.mkv
[f405360566b86cf7]
|
87,551,856 |
B9EB394D |
01.02-access_control_and_password_management.mkv
[8e3ccc1e3190157c]
|
406,385,314 |
7F082C0B |
01.03-active_defense.mkv
[95ea9bf6c993a203]
|
372,939,327 |
D2671AAD |
01.04-contingency_plans.mkv
[c2712ceaa7268294]
|
451,349,817 |
C3051560 |
01.05-critical_security_controls.mkv
[d2e6d6fd48b45e71]
|
281,330,807 |
709FD34F |
01.06-basic_cryptography.mkv
[3b96e9fb08d22869]
|
414,439,742 |
73CD2E4C |
01.07-cryptography_algorithms_and_deployment.mkv
[2c044757c6987231]
|
434,899,953 |
59028E11 |
01.08-cryptography_application.mkv
[c7139138ed95ed49]
|
522,623,008 |
FEEF80F2 |
01.09-defense_in_depth.mkv
[c845ca0e7b65d76c]
|
329,011,313 |
72E81A4D |
01.10-defensible_network_architecture.mkv
[b99db11d551298be]
|
366,652,006 |
ED40FB6A |
01.11-endpoint_security.mkv
[d24da17d9047f08]
|
345,650,294 |
216CABDA |
01.12-enforcing_windows_security.mkv
[a6e81979b63ad7ed]
|
308,806,039 |
5B500C9C |
01.13-incident_handling_and_response.mkv
[b2bf3a6ada2cfe9f]
|
352,144,858 |
054E1C3B |
01.14-it_risk_management.mkv
[afad131cd17a12e]
|
411,685,916 |
C3FD98D9 |
01.15-linux_security_structure_permissions_and_access.mkv
[92a52f75a3e8375d]
|
452,500,904 |
C6CE544D |
01.16-linux_hardening_and_securing.mkv
[b1632922f2fa3200]
|
356,068,537 |
3CF92858 |
01.17-linux_monitoring_and_attack_detection.mkv
[66e76e5e4b26d578]
|
421,660,362 |
8B695D10 |
01.18-linux_security_utilities.mkv
[99065086818df80b]
|
410,062,208 |
B63CD22B |
01.19-log_management_and_siems.mkv
[a60846f098400a51]
|
404,523,636 |
B8E3419D |
01.20-common_attack_methods.mkv
[1adf1a3366ee9473]
|
382,519,773 |
BE6D11EB |
01.21-mitigation_strategies.mkv
[ba429ad769fe32d6]
|
392,078,298 |
D49BE76E |
01.22-network_device_security.mkv
[58a8851398390ff]
|
326,571,855 |
AF451485 |
01.23-network_security_devices.mkv
[83c6b244e4bd7c0]
|
407,562,911 |
BCE2CADC |
01.24-networking_and_protocols.mkv
[8b7f39d2b34a1]
|
415,803,174 |
7E1C5572 |
01.25-securing_windows_network_services.mkv
[ea48d6461c14c8ba]
|
428,053,558 |
8A985CD6 |
01.26-security_policies.mkv
[80d5619cd9e17565]
|
317,987,571 |
BC2FFD16 |
01.27-virtualization_and_cloud_security.mkv
[8047118168fb00f1]
|
410,298,220 |
55A8066C |
01.28-web_communication_vulnerabilities.mkv
[cdaf2a59b2ff70fd]
|
354,495,534 |
E8EFDDA8 |
01.29-vulnerability_scanning_and_penetration_testing.mkv
[9be6601536779168]
|
442,828,016 |
69855C68 |
01.30-windows_access_controls.mkv
[aee65d1219949da3]
|
375,933,128 |
15E38BAC |
01.31-windows_updates.mkv
[846ebdd66d8a69ef]
|
493,919,167 |
817D43C0 |
01.32-windows_auditing_and_forensics.mkv
[de0a447f7f926780]
|
274,965,571 |
872DDBF2 |
01.33-windows_security_infrastructure.mkv
[6ff7f76ec59eaef]
|
378,366,251 |
C78C719B |
01.34-wireless_network_security.mkv
[bd498e773e250bf5]
|
307,795,370 |
6F7EFB3F |
Ex_Files_GIAC_Security_Essentials_GSEC.zip |
763,655 |
D2BAE5BC |
|
Total size: |
12,840,227,949 |
|
|