RAR-files |
ppdtsocda-c045-upskill.rar |
50,000,000 |
7B3C713D |
ppdtsocda-c045-upskill.r00 |
50,000,000 |
8F764FCC |
ppdtsocda-c045-upskill.r01 |
50,000,000 |
C65F6189 |
ppdtsocda-c045-upskill.r02 |
50,000,000 |
56A31050 |
ppdtsocda-c045-upskill.r03 |
50,000,000 |
DA6E520E |
ppdtsocda-c045-upskill.r04 |
50,000,000 |
DE24C33B |
ppdtsocda-c045-upskill.r05 |
50,000,000 |
FB6E6099 |
ppdtsocda-c045-upskill.r06 |
50,000,000 |
AF9898F2 |
ppdtsocda-c045-upskill.r07 |
50,000,000 |
205B180F |
ppdtsocda-c045-upskill.r08 |
50,000,000 |
6970E154 |
ppdtsocda-c045-upskill.r09 |
50,000,000 |
22551CA9 |
ppdtsocda-c045-upskill.r10 |
50,000,000 |
6D9D7A62 |
ppdtsocda-c045-upskill.r11 |
50,000,000 |
FAA22680 |
ppdtsocda-c045-upskill.r12 |
50,000,000 |
7654A9FD |
ppdtsocda-c045-upskill.r13 |
50,000,000 |
CADFAA0A |
ppdtsocda-c045-upskill.r14 |
50,000,000 |
DC41391C |
ppdtsocda-c045-upskill.r15 |
50,000,000 |
2B2B3269 |
ppdtsocda-c045-upskill.r16 |
50,000,000 |
C71F2AE0 |
ppdtsocda-c045-upskill.r17 |
50,000,000 |
BA28CB58 |
ppdtsocda-c045-upskill.r18 |
50,000,000 |
11E8670B |
ppdtsocda-c045-upskill.r19 |
33,694,326 |
AFD60EFD |
|
Total size: |
1,033,694,326 |
|
|
Archived
files |
PCI DSS - The State of Cardholder Data Attacks\5.Understanding the Threat Landscape - Infrastructure Attacks\22.Being Alert to Persistent Presence Attacks.mp4
[bb7cea535803eb9c]
|
53,134,676 |
7D57A904 |
PCI DSS - The State of Cardholder Data Attacks\5.Understanding the Threat Landscape - Infrastructure Attacks\24.Summary of Main Takeaways.mp4
[1dfe50ce7947b6e3]
|
46,268,575 |
D6E429B5 |
PCI DSS - The State of Cardholder Data Attacks\5.Understanding the Threat Landscape - Infrastructure Attacks\23.Smart Segmentation and Reducing Your Attack Surface.mp4
[b4f355cd15f143f3]
|
16,265,881 |
5B678662 |
PCI DSS - The State of Cardholder Data Attacks\5.Understanding the Threat Landscape - Infrastructure Attacks\21.Basic Vulnerabilities and Defense Strategies.mp4
[1c0e7e41dfa017c1]
|
54,601,812 |
87AE1053 |
PCI DSS - The State of Cardholder Data Attacks\5.Understanding the Threat Landscape - Infrastructure Attacks\25.Best Practices Going Forward.mp4
[84f33e044c7055f4]
|
58,825,728 |
6FF1E94A |
PCI DSS - The State of Cardholder Data Attacks\4.Understanding the Threat Landscape - eCommerce Attacks\18.Conducting Forensics for Cloud-based eCommerce Systems.mp4
[4d017f9232ef0a03]
|
30,507,464 |
35E0EF50 |
PCI DSS - The State of Cardholder Data Attacks\4.Understanding the Threat Landscape - eCommerce Attacks\19.The Problem with Shopping Carts.mp4
[b908a1a903ea4645]
|
50,447,413 |
CB245E4E |
PCI DSS - The State of Cardholder Data Attacks\4.Understanding the Threat Landscape - eCommerce Attacks\17.Changes to Threat Response Techniques.mp4
[aba4a4ba913dc3c8]
|
22,154,531 |
EB125068 |
PCI DSS - The State of Cardholder Data Attacks\4.Understanding the Threat Landscape - eCommerce Attacks\20.Javascript and Cross-site Scripting Attacks.mp4
[42b492fff0f7cd3e]
|
38,453,304 |
5A92E8AA |
PCI DSS - The State of Cardholder Data Attacks\4.Understanding the Threat Landscape - eCommerce Attacks\16.eCommerce Systems - Client Side Vs. Server Side Attacks.mp4
[f3bb84570e0076d7]
|
90,794,744 |
76D19F25 |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process\09.Applying the Report's Conclusions and Cleaning Up.mp4
[ebdfe8f4c9b6fd17]
|
49,017,485 |
F62F1E2C |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process\04.How Should a Breach Victim (Merchant) React.mp4
[fd0d7f37f6081e27]
|
31,631,986 |
EEB1C9E9 |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process\03.How Do You Know You've Been Breached.mp4
[c26972c83dc605d6]
|
14,281,679 |
0258FB78 |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process\02.Introducing the Authors and Their Backgrounds.mp4
[377c4120a06ccf46]
|
24,107,887 |
C9712237 |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process\10.PCI DSS Compliance and Data Breaches.mp4
[d663637b33729a3d]
|
20,119,732 |
A430DF21 |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process\05.What Does the PFI Professional do First.mp4
[b22911b07cf38301]
|
62,944,293 |
C8288756 |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process\08.Drawing Conclusions from the Evidence and Reporting.mp4
[284b7307824c1497]
|
28,623,646 |
9CD7F7F4 |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process\06.The Evidence Gathering Process.mp4
[37c0ff87ea3e7268]
|
70,301,190 |
C220AF03 |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process\07.Working with the Merchant and Their Business Needs.mp4
[ee9e67b6ab84cd7e]
|
29,094,164 |
27640BAD |
PCI DSS - The State of Cardholder Data Attacks\1.Course Overview\01.Course Overview.mp4
[ae883602bc27f747]
|
15,637,185 |
A9BA3DA9 |
PCI DSS - The State of Cardholder Data Attacks\3.Understanding the Threat Landscape - Point of Sale (POS) Attacks\12.POS System Remote Access.mp4
[90593d5889da4b0]
|
30,073,056 |
D37F16D0 |
PCI DSS - The State of Cardholder Data Attacks\3.Understanding the Threat Landscape - Point of Sale (POS) Attacks\11.Introduction to POS Attacks.mp4
[2947c6cc978e0cab]
|
57,402,153 |
6A9A1DE7 |
PCI DSS - The State of Cardholder Data Attacks\3.Understanding the Threat Landscape - Point of Sale (POS) Attacks\15.Deploying Point-to-Point Encryption.mp4
[66ca0c8dcce7abdd]
|
67,003,816 |
C87DCD7C |
PCI DSS - The State of Cardholder Data Attacks\3.Understanding the Threat Landscape - Point of Sale (POS) Attacks\14.Non-standard Pos (Card Skimming).mp4
[d14008b525c1a70a]
|
36,267,027 |
0DEFD712 |
PCI DSS - The State of Cardholder Data Attacks\3.Understanding the Threat Landscape - Point of Sale (POS) Attacks\13.Multi-factor Authentication.mp4
[14198dac11f0b53f]
|
35,725,228 |
DC8F7AB1 |
PCI DSS - The State of Cardholder Data Attacks\5.Understanding the Threat Landscape - Infrastructure Attacks |
0 |
00000000 |
PCI DSS - The State of Cardholder Data Attacks\4.Understanding the Threat Landscape - eCommerce Attacks |
0 |
00000000 |
PCI DSS - The State of Cardholder Data Attacks\2.Understanding the Forensic Collection Process |
0 |
00000000 |
PCI DSS - The State of Cardholder Data Attacks\1.Course Overview |
0 |
00000000 |
PCI DSS - The State of Cardholder Data Attacks\3.Understanding the Threat Landscape - Point of Sale (POS) Attacks |
0 |
00000000 |
PCI DSS - The State of Cardholder Data Attacks |
0 |
00000000 |
|
Total size: |
1,033,684,655 |
|
|