"People must know the past to understand the present and face the future." ―Nellie McClung"
  • U: Anonymous
  • D: 2022-02-15 22:46:38
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 XQZT File size CRC
Download
40,285
Stored files
578 83F1BC2F
29,487 3D5876D8
1,474 6B975876
RAR-files
linkedin.learning.giac.security.essentials.gsec-xqzt.rar 600,000,000 38F9CEC5
linkedin.learning.giac.security.essentials.gsec-xqzt.r00 600,000,000 2374E1EB
linkedin.learning.giac.security.essentials.gsec-xqzt.r01 600,000,000 133A57FA
linkedin.learning.giac.security.essentials.gsec-xqzt.r02 600,000,000 4C5632BA
linkedin.learning.giac.security.essentials.gsec-xqzt.r03 600,000,000 B6EF24B3
linkedin.learning.giac.security.essentials.gsec-xqzt.r04 600,000,000 2B1EE5A8
linkedin.learning.giac.security.essentials.gsec-xqzt.r05 600,000,000 5738CB44
linkedin.learning.giac.security.essentials.gsec-xqzt.r06 600,000,000 4665AEA6
linkedin.learning.giac.security.essentials.gsec-xqzt.r07 600,000,000 F9937794
linkedin.learning.giac.security.essentials.gsec-xqzt.r08 600,000,000 14F003BC
linkedin.learning.giac.security.essentials.gsec-xqzt.r09 600,000,000 AE9CE0EB
linkedin.learning.giac.security.essentials.gsec-xqzt.r10 600,000,000 D99B200E
linkedin.learning.giac.security.essentials.gsec-xqzt.r11 600,000,000 5C28E3F5
linkedin.learning.giac.security.essentials.gsec-xqzt.r12 600,000,000 7E8EAA0F
linkedin.learning.giac.security.essentials.gsec-xqzt.r13 600,000,000 B04C44DA
linkedin.learning.giac.security.essentials.gsec-xqzt.r14 600,000,000 B1D7319A
linkedin.learning.giac.security.essentials.gsec-xqzt.r15 600,000,000 A0C1352F
linkedin.learning.giac.security.essentials.gsec-xqzt.r16 600,000,000 4FD69B4C
linkedin.learning.giac.security.essentials.gsec-xqzt.r17 600,000,000 C56B6202
linkedin.learning.giac.security.essentials.gsec-xqzt.r18 600,000,000 ECD8B89D
linkedin.learning.giac.security.essentials.gsec-xqzt.r19 600,000,000 6A9EBDC9
linkedin.learning.giac.security.essentials.gsec-xqzt.r20 240,232,931 DA06C8AA

Total size: 12,840,232,931
Archived files
01.01-giac_security_essentials.mkv [f405360566b86cf7] 87,551,856 B9EB394D
01.02-access_control_and_password_management.mkv [8e3ccc1e3190157c] 406,385,314 7F082C0B
01.03-active_defense.mkv [95ea9bf6c993a203] 372,939,327 D2671AAD
01.04-contingency_plans.mkv [c2712ceaa7268294] 451,349,817 C3051560
01.05-critical_security_controls.mkv [d2e6d6fd48b45e71] 281,330,807 709FD34F
01.06-basic_cryptography.mkv [3b96e9fb08d22869] 414,439,742 73CD2E4C
01.07-cryptography_algorithms_and_deployment.mkv [2c044757c6987231] 434,899,953 59028E11
01.08-cryptography_application.mkv [c7139138ed95ed49] 522,623,008 FEEF80F2
01.09-defense_in_depth.mkv [c845ca0e7b65d76c] 329,011,313 72E81A4D
01.10-defensible_network_architecture.mkv [b99db11d551298be] 366,652,006 ED40FB6A
01.11-endpoint_security.mkv [d24da17d9047f08] 345,650,294 216CABDA
01.12-enforcing_windows_security.mkv [a6e81979b63ad7ed] 308,806,039 5B500C9C
01.13-incident_handling_and_response.mkv [b2bf3a6ada2cfe9f] 352,144,858 054E1C3B
01.14-it_risk_management.mkv [afad131cd17a12e] 411,685,916 C3FD98D9
01.15-linux_security_structure_permissions_and_access.mkv [92a52f75a3e8375d] 452,500,904 C6CE544D
01.16-linux_hardening_and_securing.mkv [b1632922f2fa3200] 356,068,537 3CF92858
01.17-linux_monitoring_and_attack_detection.mkv [66e76e5e4b26d578] 421,660,362 8B695D10
01.18-linux_security_utilities.mkv [99065086818df80b] 410,062,208 B63CD22B
01.19-log_management_and_siems.mkv [a60846f098400a51] 404,523,636 B8E3419D
01.20-common_attack_methods.mkv [1adf1a3366ee9473] 382,519,773 BE6D11EB
01.21-mitigation_strategies.mkv [ba429ad769fe32d6] 392,078,298 D49BE76E
01.22-network_device_security.mkv [58a8851398390ff] 326,571,855 AF451485
01.23-network_security_devices.mkv [83c6b244e4bd7c0] 407,562,911 BCE2CADC
01.24-networking_and_protocols.mkv [8b7f39d2b34a1] 415,803,174 7E1C5572
01.25-securing_windows_network_services.mkv [ea48d6461c14c8ba] 428,053,558 8A985CD6
01.26-security_policies.mkv [80d5619cd9e17565] 317,987,571 BC2FFD16
01.27-virtualization_and_cloud_security.mkv [8047118168fb00f1] 410,298,220 55A8066C
01.28-web_communication_vulnerabilities.mkv [cdaf2a59b2ff70fd] 354,495,534 E8EFDDA8
01.29-vulnerability_scanning_and_penetration_testing.mkv [9be6601536779168] 442,828,016 69855C68
01.30-windows_access_controls.mkv [aee65d1219949da3] 375,933,128 15E38BAC
01.31-windows_updates.mkv [846ebdd66d8a69ef] 493,919,167 817D43C0
01.32-windows_auditing_and_forensics.mkv [de0a447f7f926780] 274,965,571 872DDBF2
01.33-windows_security_infrastructure.mkv [6ff7f76ec59eaef] 378,366,251 C78C719B
01.34-wireless_network_security.mkv [bd498e773e250bf5] 307,795,370 6F7EFB3F
Ex_Files_GIAC_Security_Essentials_GSEC.zip 763,655 D2BAE5BC

Total size: 12,840,227,949
Video files
Sample
linkedin.learning.giac.security.essentials.gsec-xqzt-sample.mkv 22,298,215 8D60E1D4
RAR Recovery
Not Present
Labels UNKNOWN