An SRR file on this site doesn't mean the release ever leaked!
  • U: Anonymous
  • D: 2018-12-12 07:36:13
  • C: APPS

RELEASE >

ReScene version pyReScene Auto 0.7 JGTiSO File size CRC
Download
36,896
Stored files
5,907 2475D1CC
1,680 879B129D
RAR-files
jgt-evaluating-organizations-security-posture.rar 15,000,000 32001C69
jgt-evaluating-organizations-security-posture.r00 15,000,000 406FC0E6
jgt-evaluating-organizations-security-posture.r01 15,000,000 4633708F
jgt-evaluating-organizations-security-posture.r02 15,000,000 3266951F
jgt-evaluating-organizations-security-posture.r03 15,000,000 63C89B54
jgt-evaluating-organizations-security-posture.r04 15,000,000 2C826159
jgt-evaluating-organizations-security-posture.r05 15,000,000 002491E4
jgt-evaluating-organizations-security-posture.r06 15,000,000 2CA5A2D0
jgt-evaluating-organizations-security-posture.r07 15,000,000 F4601C5E
jgt-evaluating-organizations-security-posture.r08 15,000,000 B8095786
jgt-evaluating-organizations-security-posture.r09 15,000,000 AFD24825
jgt-evaluating-organizations-security-posture.r10 15,000,000 67908DCE
jgt-evaluating-organizations-security-posture.r11 15,000,000 CA2F995C
jgt-evaluating-organizations-security-posture.r12 15,000,000 8CF5D452
jgt-evaluating-organizations-security-posture.r13 15,000,000 D39477B3
jgt-evaluating-organizations-security-posture.r14 15,000,000 CA49ED92
jgt-evaluating-organizations-security-posture.r15 15,000,000 AA61EA9F
jgt-evaluating-organizations-security-posture.r16 15,000,000 16473EAE
jgt-evaluating-organizations-security-posture.r17 15,000,000 D7DDD1CB
jgt-evaluating-organizations-security-posture.r18 15,000,000 FBF8EB4D
jgt-evaluating-organizations-security-posture.r19 15,000,000 1A079BE4
jgt-evaluating-organizations-security-posture.r20 15,000,000 88CAC9BB
jgt-evaluating-organizations-security-posture.r21 15,000,000 AB19D5AE
jgt-evaluating-organizations-security-posture.r22 15,000,000 FD9D53C6
jgt-evaluating-organizations-security-posture.r23 15,000,000 D04335B2
jgt-evaluating-organizations-security-posture.r24 15,000,000 398B076E
jgt-evaluating-organizations-security-posture.r25 15,000,000 8E032EEE
jgt-evaluating-organizations-security-posture.r26 10,051,877 7F03635C

Total size: 415,051,877
Archived files
Pluralsight Evaluating Your Organization’s Security Posture\01.Course Overview\0101.Course Overview.mp4 [ddb9faaa458fa9f3] 4,620,979 A13DF48D
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0201.Overview.mp4 [bac82f4f703673c3] 3,928,965 5DA92FDD
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0202.Practices of an Evaluation.mp4 [cdcc6a7e84615527] 4,452,511 03A6A2BD
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0203.Metrics and Measurements Primer.mp4 [e99842cfc1f07be] 7,011,417 DF7268B5
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0204.Introduction to the Scenario.mp4 [5263cd167c82f98d] 5,686,122 EB8A9CE8
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0205.Demo Risk Assessment in Eramba.mp4 [20a4ce605adf9826] 33,579,121 74441FF1
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security\0206.Summary.mp4 [4002cec38538fd32] 1,937,404 B8CD0A31
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0301.Overview.mp4 [beb63eacb0f4f6fa] 2,576,557 46116670
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0302.Logical Areas of IT.mp4 [41bf813dc037fda9] 3,763,564 1887AE85
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0303.New and Evolving Areas of IT.mp4 [cd0f6410c8546564] 5,358,987 2442794B
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0304.Basics of Planning and Organizing Your Evaluation.mp4 [9fe277575a1a0ac2] 6,410,876 70C969F6
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0305.Demo Building a Project Plan in Trello.mp4 [6cb16d5ddd99b617] 11,617,796 2361AA83
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0306.The Info Gathering Cycle.mp4 [a46fac19fddaa02c] 1,413,815 165CFC8E
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0307.Frameworks for Guiding Evaluations.mp4 [ffe651667524ee2c] 20,051,117 AAFBF981
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0308.Demo Review the Top 20 CIS Controls in Eramba.mp4 [a5ee4a5e3e72ee95] 5,500,343 195FFA00
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation\0309.Summary.mp4 [7fa1fdb21347f757] 1,216,935 B7FC353F
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0401.Overview.mp4 [3fe1ca061d6d68df] 1,718,191 6B82E0B4
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0402.Types of Evidence.mp4 [bc99d055fdd1b84d] 11,103,619 D1584DF7
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0403.Policies and Procedures.mp4 [feebe1b57c3e89e3] 4,094,562 FB43F9F1
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0404.Tips and Tricks for Interviews.mp4 [93fb5a05ad74e9cc] 6,501,268 FCCBDE3C
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0405.Maintaining Evidence Integrity.mp4 [13ec3c92373b1824] 2,603,803 D38EE061
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0406.Demo Generating a Hash with PowerShell.mp4 [26eb9174f4ecf168] 6,749,105 99594C12
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews\0407.Summary.mp4 [7380e7913421ae75] 1,435,116 B695CCE0
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0501.Overview .mp4 [37eef8f2be597455] 1,481,765 26091D68
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0502.Understanding Layers of Physical Security.mp4 [47f059ade8281063] 5,437,261 F2A6A3F2
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0503.Threats and Vulnerabilities.mp4 [d18d00e9ffb945fe] 3,529,489 4BF1BE35
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0504.Outer Perimeter Controls and Countermeasures.mp4 [46c5727246cd541e] 2,560,245 8F45F144
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0505.Inner Perimeter Controls and Countermeasures.mp4 [8722f0d91a32941] 5,191,056 28A166F1
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0506.Locks, Badges, and CCTV.mp4 [8de5e67424308cc] 3,741,581 3031835E
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0507.Work Center Security.mp4 [99695b28852746d9] 3,277,372 D94CFC4B
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0508.Inventory and Vendor Management.mp4 [ce2ebe364276a7d8] 4,123,877 12BF54CA
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0509.Testing and Assessing Physical Controls.mp4 [1976110222681b75] 2,172,236 56A159D4
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security\0510.Summary.mp4 [d089c2a67e6e7d98] 1,770,376 C9D7635E
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0601.Overview.mp4 [7c744820968db2b1] 3,999,973 0EDCC345
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0602.Why You Should Map Your External Footprint.mp4 [5d5548f42300f081] 12,457,968 657AD66E
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0603.The Process of Evaluating Your External Environment.mp4 [b8830df853c19eaa] 3,419,286 20C0B430
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0604.Enumerating Subdomains & Demo.mp4 [4f79d52169f7d7ac] 6,214,918 532511CF
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0605.Email Addresses Are a Target.mp4 [2b0e924e5e44f301] 1,482,416 2CC381E4
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0606.Evaluating Your Cloud Tenant.mp4 [c1e5c75e28de9d5e] 7,405,720 9A697F0E
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0607.Assessing Web Apps.mp4 [dbf06328ab261367] 3,389,081 ED245525
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0608.Assessing Bug Tracking & Release Cycles.mp4 [32c1ba866ede4e62] 7,442,849 D513A672
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0609.Questions for Penetration Testing and Vulnerability Scanning.mp4 [13e3c6a2351b18c8] 6,987,264 E6DA0ADF
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0610.Considerations for SaaS.mp4 [26c57f4256a2610a] 4,379,332 EBFACC20
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0611.Demo Finding Secrets in GitHub.mp4 [8e140b758fcccd33] 8,308,286 DAAE2471
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint\0612.Summary.mp4 [b4fea2a555da9a71] 3,050,708 7A83237B
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0701.Overview.mp4 [50e69bd3ee0ee8f3] 3,764,217 87DAAC2A
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0702.Assessing AD and Administrators.mp4 [890ec5b9d8481e61] 6,056,017 E5326268
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0703.IT Services and Account Lifecycle.mp4 [e4447999fb1b99ab] 5,133,605 60236F66
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0704.Investigating Email Security.mp4 [8498072e942e2d72] 3,275,547 5930DF07
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0705.Assessing NTP.mp4 [6dbf3ecd56bb33f8] 3,279,785 76F23073
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0706.Evaluating Log Practices.mp4 [364c55cd64f38f9b] 2,041,264 69EF5161
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0707.Digging into Fileshares.mp4 [6975f5e1dd0c5736] 3,188,366 9A6A4D32
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0708.DNS Security Posture.mp4 [8312282757cc15eb] 6,585,576 5A373503
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0709.Evaluating Networking.mp4 [4ecc78d3adf16558] 4,201,848 5FF793D6
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0710.Vulnerability Management.mp4 [813df8320e6945c5] 3,185,371 BC42D45C
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0711.All About Incident Response.mp4 [bc8964fb31af369d] 7,542,407 F81FE6CA
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture\0712.Summary.mp4 [ead34d7f85e09943] 1,369,133 A408D82C
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0801.Overview.mp4 [cd673181ecd4349] 4,697,740 C0721E18
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0802.Assessing Employee Security Training.mp4 [ea74c2bcd1523ee] 5,474,202 B097EF9A
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0803.Avenues of Social Engineering.mp4 [21d0e3dd0129fb48] 5,943,549 0BC0572B
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0804.Why to Focus Efforts on Phishing.mp4 [396a337d42f55d5b] 3,048,756 3BB53F9E
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0805.Gophish Demo.mp4 [75ec360ecbdc9f33] 19,021,880 0CDD7990
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering\0806.Summary.mp4 [a3fe99df42c0da6b] 2,484,177 32D59714
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0901.Overview.mp4 [ec8df19dd8880dde] 3,701,906 363B6FC9
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0902.Creating Measurements and Metrics.mp4 [663cf6c797830b92] 4,625,022 F33C038D
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0903. Planning and Organizing Measures.mp4 [af00fe3a5b700d94] 2,982,160 CB664282
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0904.Evidence Measures.mp4 [3bd9f8bac838bd00] 3,252,912 14D3C67C
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0905.Physical Measures.mp4 [d584c7a3c39a7bb2] 2,243,640 2EE13C9C
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0906.External Measures.mp4 [f4a720fa78b1d8d7] 5,013,353 B53C5F62
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0907.Internal Measures.mp4 [ff249df1c71b507f] 3,689,604 B8A4DA39
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0908.Social Engineering Measures.mp4 [af29f69b208f3619] 1,921,553 1EECF82D
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0909.Dashboard Example.mp4 [a562754b85fc4c5c] 4,059,463 059E8065
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations\0910.Summary.mp4 [9d2f9caa8495c886] 1,505,628 E2E0BC96
Pluralsight Evaluating Your Organization’s Security Posture\10.Wrapping the Security Evaluation\1001. Completing the Evaluation.mp4 [8540f5ece692d6bc] 16,554,630 A2A25EBF
Pluralsight Evaluating Your Organization’s Security Posture\Exercise Files\evaluating-organizations-security-posture.zip 15,917,047 69132759
Pluralsight Evaluating Your Organization’s Security Posture\01.Course Overview 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\02.The Case for Evaluating Your Organization’s Security 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\03.Planning and Organizing the Evaluation 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\04.Collecting Data and Conducting Interviews 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\05.Evaluating Your Organization’s Physical Security 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\06.Evaluating the External Footprint 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\07.Evaluating the Internal IT Security Posture 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\08.Evaluating the Weakest Link - Social Engineering 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\09.Setting the Benchmark and the Concept of Iterative Evaluations 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\10.Wrapping the Security Evaluation 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture\Exercise Files 0 00000000
Pluralsight Evaluating Your Organization’s Security Posture 0 00000000

Total size: 410,915,590
RAR Recovery
Present (Protect+) 4,113,030
Labels APPS