RAR-files |
e-lsca.rar |
15,000,000 |
4603CBBC |
e-lsca.r00 |
15,000,000 |
ACF551D8 |
e-lsca.r01 |
15,000,000 |
041C2E0E |
e-lsca.r02 |
15,000,000 |
141E5041 |
e-lsca.r03 |
15,000,000 |
3F3A9219 |
e-lsca.r04 |
15,000,000 |
3111ABCD |
e-lsca.r05 |
15,000,000 |
1393371A |
e-lsca.r06 |
15,000,000 |
29206F2F |
e-lsca.r07 |
13,174,081 |
AB8D2A41 |
|
Total size: |
133,174,081 |
|
|
Archived
files |
01 - Course_Overview.mp4 |
2,621,389 |
EA85B8EE |
06 - Log_Management_-_Part_One.mp4 |
8,561,322 |
DC8965C1 |
03 - Testing_and_Assessment_of_Information_and_Information_Systems_-_Part_Two.mp4 |
8,065,032 |
BFC78DA6 |
05 - Testing_and_Assessment_of_Information_and_Information_Systems_-_Part_Four.mp4 |
7,970,956 |
C035320B |
04 - Testing_and_Assessment_of_Information_and_Information_Systems_-_Part_Three.mp4 |
8,404,311 |
9F8143BF |
08 - Honey_Nets.mp4 |
8,864,343 |
25EE089C |
02 - Security_Control_Assessment_Introduction.mp4 |
12,209,362 |
6540B2A4 |
07 - Log_Management_-_Part_Two.mp4 |
10,065,533 |
FC04A6AA |
17 - Other_Test_Areas_-_Part_One.mp4 |
13,146,578 |
69A85E26 |
14 - Penetration_Testing_-_Part_Four.mp4 |
9,076,693 |
A614FFAA |
16 - Conducting_a_Penetration_Test.mp4 |
11,684,441 |
78D4714E |
13 - Vulnerability_Assessment_-_Part_Two.mp4 |
7,299,357 |
04CF6199 |
15 - Penetration_Testing_-_Part_Five.mp4 |
7,698,532 |
B029E10A |
11 - Penetration_Testing_-_Part_Three.mp4 |
9,608,888 |
4CD85346 |
12 - Vulnerability_Assessment_-_Part_One.mp4 |
6,996,389 |
DD06EB30 |
18 - Other_Test_Areas_-_Part_Two.mp4 |
13,219,735 |
F9D69196 |
10 - Penetration_Testing_-_Part_Two.mp4 |
10,235,477 |
0947E4A6 |
09 - Penetration_Testing_-_Part_One.mp4 |
8,408,879 |
E7C5A64E |
20 - Audit_and_Reporting_-_Part_Two.mp4 |
7,367,005 |
6E07CD1C |
19 - Audit_and_Reporting_-_Part_One.mp4 |
9,121,836 |
4A2B0E04 |
21 - Assessment_and_Criteria_-_Part_One.mp4 |
7,600,719 |
B2CD92ED |
22 - Assessment_and_Criteria_-_Part_Two.mp4 |
10,541,099 |
7A4679B7 |
security-control-assessment.zip |
1,406,207 |
05B50B74 |
|
Total size: |
200,174,083 |
|
|