When it's fine, it's fine.
  • U: Anonymous
  • D: 2022-03-29 10:51:18
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 XQZT File size CRC
Download
38,938
Stored files
721 BC1F5001
27,631 43F8E9EE
696 1D7D74BD
RAR-files
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.rar 100,000,000 91AE62BE
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r00 100,000,000 F5A4E1EB
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r01 100,000,000 37C9538F
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r02 100,000,000 5320D3D9
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r03 100,000,000 7FFF71DF
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r04 100,000,000 213CABDD
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r05 100,000,000 6E9A0145
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r06 66,535,303 08044E3A

Total size: 766,535,303
Archived files
01.01-securing_systems_and_applications.mkv [2d617648d0e46abb] 26,966,449 CFEB0545
01.02-what_you_need_to_know.mkv [f1a515640e9afab] 1,637,043 AFEB7378
01.03-study_resources.mkv [5995ca1ae88faa67] 6,359,451 0307434D
02.01-comparing_viruses_worms_and_trojans.mkv [2346d56441dba82a] 25,252,559 30E3E3B9
02.02-malware_payloads.mkv [d1ddb31680c96589] 17,909,516 838EF57E
02.03-understanding_backdoors_and_logic_bombs.mkv [3b503b9f752d6cae] 14,688,155 7E569C2B
02.04-looking_at_advanced_malware.mkv [8b9b904e5459195c] 8,161,533 89AE1A48
02.05-understanding_botnets.mkv [4adab00708294c3b] 7,162,624 1F7360F0
02.06-code_signing.mkv [a01181ce095cf3b6] 7,382,086 201AADFD
03.01-cybersecurity_adversaries.mkv [f1c63092508b3ce7] 18,686,071 6DEC12AD
03.02-preventing_insider_threats.mkv [a2fe512f51b7a1fb] 10,780,216 9A62E997
03.03-attack_vectors.mkv [c9f74dbc71920710] 16,588,841 E4DCBC4C
03.04-zero-days_and_the_advanced_persistent_threat.mkv [e819846863776d93] 9,009,733 8C25F004
04.01-social_engineering.mkv [2ce75a0ab96b1e06] 21,398,244 38E23263
04.02-impersonation_attacks.mkv [f37e0336b0faeb9a] 15,321,871 888B8F41
04.03-identity_fraud_and_pretexting.mkv [901e7a5b333ac5d0] 6,277,017 4FC24763
04.04-watering_hole_attacks.mkv [be4b614fe749d30d] 9,295,137 D4286AD3
04.05-physical_social_engineering.mkv [6b68c814ea24970b] 12,656,852 801A8B54
05.01-owasp_top_ten.mkv [95d562be865943de] 13,433,213 F97417EE
05.02-application_security.mkv [ab942f2177cfabd7] 10,889,432 7C01AB19
05.03-preventing_sql_injection.mkv [c099d1eaa565e3e7] 11,447,724 2FB07FC1
05.04-understanding_cross-site_scripting.mkv [d6e415cefcf852c6] 9,340,666 7F0CE991
05.05-request_forgery.mkv [8b8ce9e7ecee1b80] 13,182,728 3400BBED
05.06-defending_against_directory_traversal.mkv [a7cfdf56cf353afa] 9,773,715 B3D5384C
05.07-overflow_attacks.mkv [db610afbbbf7b88e] 11,570,865 CD2E3129
05.08-explaining_cookies_and_attachments.mkv [72adc7e0e4001561] 13,415,702 CE3427B5
05.09-session_hijacking.mkv [80efaa4d43314eaf] 14,465,958 AB61EEF0
05.10-code_execution_attacks.mkv [4ec01a0d446a9162] 6,443,257 1D1335F1
06.01-operating_system_security.mkv [c9dcd6afc475ca7e] 29,002,294 912A8431
06.02-malware_prevention.mkv [f80b2d66c2abf223] 9,807,629 98F959FB
06.03-application_management.mkv [d633ba0f8ced3661] 15,865,340 85B9B13F
06.04-host-based_network_security_controls.mkv [ec100441829cc2b2] 24,286,044 50560CC9
06.05-file_integrity_monitoring.mkv [2a7ce4beba17d4ff] 12,764,965 67D9F579
06.06-data_loss_prevention.mkv [37abd29cab13c6b0] 12,548,918 06E8CA39
06.07-endpoint_monitoring.mkv [708e639231e0a421] 8,420,681 FBC29296
07.01-data_encryption.mkv [d9583fac221fdfcf] 17,739,282 ED9C9539
07.02-hardware_and_firmware_security.mkv [cf41ebc453c8e750] 14,846,743 F7636BC3
07.03-peripheral_security.mkv [3ef7a6e0c364a541] 7,922,619 3ABE4CBE
08.01-mobile_connection_methods.mkv [4d5163521f8009a2] 16,839,503 CD57DADD
08.02-mobile_device_security.mkv [c5be8f28e33295e8] 12,457,057 38BDC157
08.03-mobile_device_management.mkv [2cd46c81bb7e0d97] 18,917,149 A19EFFD6
08.04-mobile_device_tracking.mkv [1f224b969283dfe9] 10,244,051 BFF5C709
08.05-mobile_application_management.mkv [d5fc5321e7bb58a3] 10,292,144 FCFB250F
08.06-mobile_security_enforcement.mkv [2300dd3fc28cf4e5] 10,629,701 A5ABF994
08.07-bring_your_own_device_(byod).mkv [d4dc2765f9e187b0] 12,429,914 EA26F8D5
08.08-mobile_deployment_models.mkv [8d216bf30cbf9c0b] 7,192,775 0FAD7725
09.01-industrial_control_systems.mkv [6964c953042cfb7e] 13,941,622 02A74FBC
09.02-internet_of_things.mkv [9ecca219cf4e0866] 10,718,497 2A31678C
09.03-securing_smart_devices.mkv [2694d7c9605c0a3b] 7,895,178 A4D3C705
09.04-secure_networking_for_smart_devices.mkv [ee0e905253f37bf6] 5,929,748 5F95C843
10.01-what_is_the_cloud.mkv [84437dfaed0fd210] 12,356,285 17C13CEF
10.02-cloud_activities_and_the_cloud_reference_architecture.mkv [3d1501cf10618f6a] 7,272,993 5383D7E6
10.03-cloud_deployment_models.mkv [99182f6215c0d5f3] 5,958,045 9742D9D9
10.04-cloud_service_categories.mkv [a2ec7aa479b810a4] 18,506,480 5758B6E5
10.05-virtualization.mkv [c4f6bf74afdeb551] 12,540,575 1F4F209C
10.06-cloud_compute_resources.mkv [6da5b03a339738a9] 25,265,638 23E62C3E
10.07-cloud_storage.mkv [b1e183bef4763a69] 6,994,592 2A59ADBF
10.08-containers.mkv [acfd63230c36601a] 4,165,027 D6274F0A
11.01-security_and_privacy_concerns_in_the_cloud.mkv [73b2cde8c3909828] 10,136,828 619F1953
11.02-data_sovereignty.mkv [46e72a694677f45c] 8,775,858 77CA3473
11.03-operational_concerns_in_the_cloud.mkv [8d59b4db402bf9d1] 10,698,229 049F88D1
12.01-continuing_your_studies.mkv [abe0b9377c65f16] 3,671,007 DE160E4F

Total size: 766,530,069
Video files
Sample
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt-sample.mkv 3,563,091 434162E3
RAR Recovery
Not Present
Labels UNKNOWN