RAR-files |
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.rar |
100,000,000 |
91AE62BE |
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r00 |
100,000,000 |
F5A4E1EB |
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r01 |
100,000,000 |
37C9538F |
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r02 |
100,000,000 |
5320D3D9 |
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r03 |
100,000,000 |
7FFF71DF |
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r04 |
100,000,000 |
213CABDD |
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r05 |
100,000,000 |
6E9A0145 |
linkedin.learning.sscp.cert.prep.7.systems.and.application.security-xqzt.r06 |
66,535,303 |
08044E3A |
|
Total size: |
766,535,303 |
|
|
Archived
files |
01.01-securing_systems_and_applications.mkv
[2d617648d0e46abb]
|
26,966,449 |
CFEB0545 |
01.02-what_you_need_to_know.mkv
[f1a515640e9afab]
|
1,637,043 |
AFEB7378 |
01.03-study_resources.mkv
[5995ca1ae88faa67]
|
6,359,451 |
0307434D |
02.01-comparing_viruses_worms_and_trojans.mkv
[2346d56441dba82a]
|
25,252,559 |
30E3E3B9 |
02.02-malware_payloads.mkv
[d1ddb31680c96589]
|
17,909,516 |
838EF57E |
02.03-understanding_backdoors_and_logic_bombs.mkv
[3b503b9f752d6cae]
|
14,688,155 |
7E569C2B |
02.04-looking_at_advanced_malware.mkv
[8b9b904e5459195c]
|
8,161,533 |
89AE1A48 |
02.05-understanding_botnets.mkv
[4adab00708294c3b]
|
7,162,624 |
1F7360F0 |
02.06-code_signing.mkv
[a01181ce095cf3b6]
|
7,382,086 |
201AADFD |
03.01-cybersecurity_adversaries.mkv
[f1c63092508b3ce7]
|
18,686,071 |
6DEC12AD |
03.02-preventing_insider_threats.mkv
[a2fe512f51b7a1fb]
|
10,780,216 |
9A62E997 |
03.03-attack_vectors.mkv
[c9f74dbc71920710]
|
16,588,841 |
E4DCBC4C |
03.04-zero-days_and_the_advanced_persistent_threat.mkv
[e819846863776d93]
|
9,009,733 |
8C25F004 |
04.01-social_engineering.mkv
[2ce75a0ab96b1e06]
|
21,398,244 |
38E23263 |
04.02-impersonation_attacks.mkv
[f37e0336b0faeb9a]
|
15,321,871 |
888B8F41 |
04.03-identity_fraud_and_pretexting.mkv
[901e7a5b333ac5d0]
|
6,277,017 |
4FC24763 |
04.04-watering_hole_attacks.mkv
[be4b614fe749d30d]
|
9,295,137 |
D4286AD3 |
04.05-physical_social_engineering.mkv
[6b68c814ea24970b]
|
12,656,852 |
801A8B54 |
05.01-owasp_top_ten.mkv
[95d562be865943de]
|
13,433,213 |
F97417EE |
05.02-application_security.mkv
[ab942f2177cfabd7]
|
10,889,432 |
7C01AB19 |
05.03-preventing_sql_injection.mkv
[c099d1eaa565e3e7]
|
11,447,724 |
2FB07FC1 |
05.04-understanding_cross-site_scripting.mkv
[d6e415cefcf852c6]
|
9,340,666 |
7F0CE991 |
05.05-request_forgery.mkv
[8b8ce9e7ecee1b80]
|
13,182,728 |
3400BBED |
05.06-defending_against_directory_traversal.mkv
[a7cfdf56cf353afa]
|
9,773,715 |
B3D5384C |
05.07-overflow_attacks.mkv
[db610afbbbf7b88e]
|
11,570,865 |
CD2E3129 |
05.08-explaining_cookies_and_attachments.mkv
[72adc7e0e4001561]
|
13,415,702 |
CE3427B5 |
05.09-session_hijacking.mkv
[80efaa4d43314eaf]
|
14,465,958 |
AB61EEF0 |
05.10-code_execution_attacks.mkv
[4ec01a0d446a9162]
|
6,443,257 |
1D1335F1 |
06.01-operating_system_security.mkv
[c9dcd6afc475ca7e]
|
29,002,294 |
912A8431 |
06.02-malware_prevention.mkv
[f80b2d66c2abf223]
|
9,807,629 |
98F959FB |
06.03-application_management.mkv
[d633ba0f8ced3661]
|
15,865,340 |
85B9B13F |
06.04-host-based_network_security_controls.mkv
[ec100441829cc2b2]
|
24,286,044 |
50560CC9 |
06.05-file_integrity_monitoring.mkv
[2a7ce4beba17d4ff]
|
12,764,965 |
67D9F579 |
06.06-data_loss_prevention.mkv
[37abd29cab13c6b0]
|
12,548,918 |
06E8CA39 |
06.07-endpoint_monitoring.mkv
[708e639231e0a421]
|
8,420,681 |
FBC29296 |
07.01-data_encryption.mkv
[d9583fac221fdfcf]
|
17,739,282 |
ED9C9539 |
07.02-hardware_and_firmware_security.mkv
[cf41ebc453c8e750]
|
14,846,743 |
F7636BC3 |
07.03-peripheral_security.mkv
[3ef7a6e0c364a541]
|
7,922,619 |
3ABE4CBE |
08.01-mobile_connection_methods.mkv
[4d5163521f8009a2]
|
16,839,503 |
CD57DADD |
08.02-mobile_device_security.mkv
[c5be8f28e33295e8]
|
12,457,057 |
38BDC157 |
08.03-mobile_device_management.mkv
[2cd46c81bb7e0d97]
|
18,917,149 |
A19EFFD6 |
08.04-mobile_device_tracking.mkv
[1f224b969283dfe9]
|
10,244,051 |
BFF5C709 |
08.05-mobile_application_management.mkv
[d5fc5321e7bb58a3]
|
10,292,144 |
FCFB250F |
08.06-mobile_security_enforcement.mkv
[2300dd3fc28cf4e5]
|
10,629,701 |
A5ABF994 |
08.07-bring_your_own_device_(byod).mkv
[d4dc2765f9e187b0]
|
12,429,914 |
EA26F8D5 |
08.08-mobile_deployment_models.mkv
[8d216bf30cbf9c0b]
|
7,192,775 |
0FAD7725 |
09.01-industrial_control_systems.mkv
[6964c953042cfb7e]
|
13,941,622 |
02A74FBC |
09.02-internet_of_things.mkv
[9ecca219cf4e0866]
|
10,718,497 |
2A31678C |
09.03-securing_smart_devices.mkv
[2694d7c9605c0a3b]
|
7,895,178 |
A4D3C705 |
09.04-secure_networking_for_smart_devices.mkv
[ee0e905253f37bf6]
|
5,929,748 |
5F95C843 |
10.01-what_is_the_cloud.mkv
[84437dfaed0fd210]
|
12,356,285 |
17C13CEF |
10.02-cloud_activities_and_the_cloud_reference_architecture.mkv
[3d1501cf10618f6a]
|
7,272,993 |
5383D7E6 |
10.03-cloud_deployment_models.mkv
[99182f6215c0d5f3]
|
5,958,045 |
9742D9D9 |
10.04-cloud_service_categories.mkv
[a2ec7aa479b810a4]
|
18,506,480 |
5758B6E5 |
10.05-virtualization.mkv
[c4f6bf74afdeb551]
|
12,540,575 |
1F4F209C |
10.06-cloud_compute_resources.mkv
[6da5b03a339738a9]
|
25,265,638 |
23E62C3E |
10.07-cloud_storage.mkv
[b1e183bef4763a69]
|
6,994,592 |
2A59ADBF |
10.08-containers.mkv
[acfd63230c36601a]
|
4,165,027 |
D6274F0A |
11.01-security_and_privacy_concerns_in_the_cloud.mkv
[73b2cde8c3909828]
|
10,136,828 |
619F1953 |
11.02-data_sovereignty.mkv
[46e72a694677f45c]
|
8,775,858 |
77CA3473 |
11.03-operational_concerns_in_the_cloud.mkv
[8d59b4db402bf9d1]
|
10,698,229 |
049F88D1 |
12.01-continuing_your_studies.mkv
[abe0b9377c65f16]
|
3,671,007 |
DE160E4F |
|
Total size: |
766,530,069 |
|
|