RAR-files |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.rar |
50,000,000 |
CA3EF307 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r00 |
50,000,000 |
B3C6CCE7 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r01 |
50,000,000 |
5A23294E |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r02 |
50,000,000 |
92C79D0E |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r03 |
50,000,000 |
86791C14 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r04 |
50,000,000 |
A545B4E2 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r05 |
50,000,000 |
AD0BB4FA |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r06 |
50,000,000 |
7BC0507C |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r07 |
50,000,000 |
91274C21 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r08 |
50,000,000 |
41243867 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r09 |
50,000,000 |
42868A8E |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r10 |
50,000,000 |
27355829 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r11 |
50,000,000 |
9C906D33 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r12 |
50,000,000 |
661C739A |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r13 |
50,000,000 |
A33D4CE4 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r14 |
50,000,000 |
EAEEA462 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r15 |
50,000,000 |
94558F86 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r16 |
50,000,000 |
442571B7 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r17 |
50,000,000 |
F2E459A9 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r18 |
50,000,000 |
A6666C83 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r19 |
50,000,000 |
4FABE06A |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r20 |
50,000,000 |
18288A6A |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r21 |
50,000,000 |
6F11A58C |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r22 |
50,000,000 |
61E3F39A |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r23 |
50,000,000 |
CB44F8DE |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r24 |
50,000,000 |
84D112C1 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r25 |
50,000,000 |
A462014B |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r26 |
50,000,000 |
9506EC5B |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r27 |
50,000,000 |
C0773A15 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r28 |
50,000,000 |
4178BE70 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r29 |
50,000,000 |
445140F1 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r30 |
50,000,000 |
AB8FEA0B |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r31 |
50,000,000 |
66C90A56 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r32 |
50,000,000 |
ED70730A |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r33 |
50,000,000 |
37CA5EE7 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r34 |
50,000,000 |
F6853A4D |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r35 |
50,000,000 |
E02CF02F |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r36 |
50,000,000 |
0D6A8D61 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r37 |
50,000,000 |
0E17E214 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r38 |
50,000,000 |
7A5785D5 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r39 |
50,000,000 |
BC212B80 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r40 |
50,000,000 |
1ECD44A2 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r41 |
50,000,000 |
593AA768 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r42 |
50,000,000 |
6AD2C5B9 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r43 |
50,000,000 |
9C315812 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r44 |
50,000,000 |
5CDCE15C |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r45 |
50,000,000 |
01209B76 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r46 |
50,000,000 |
3983BA20 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r47 |
50,000,000 |
9E972CF3 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r48 |
50,000,000 |
4AF183EC |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r49 |
50,000,000 |
54DCACB0 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r50 |
50,000,000 |
6F2FEB38 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r51 |
50,000,000 |
62A21FC5 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r52 |
50,000,000 |
37F33E5F |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r53 |
50,000,000 |
19172763 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r54 |
50,000,000 |
B0561CFD |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r55 |
50,000,000 |
788E1478 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r56 |
50,000,000 |
3F007CCF |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r57 |
50,000,000 |
E66F57A8 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r58 |
50,000,000 |
8958EEB4 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r59 |
50,000,000 |
DC2D3934 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r60 |
50,000,000 |
751BADC2 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r61 |
50,000,000 |
43BD41B6 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r62 |
50,000,000 |
07E0A25E |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r63 |
50,000,000 |
3A2564CD |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r64 |
50,000,000 |
49896A51 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r65 |
50,000,000 |
0E1D9298 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r66 |
50,000,000 |
81533258 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r67 |
50,000,000 |
8B973A41 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r68 |
50,000,000 |
F4B5F34C |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r69 |
50,000,000 |
1A66D1A0 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r70 |
50,000,000 |
DE2A05E2 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r71 |
50,000,000 |
7DDE3639 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r72 |
50,000,000 |
731621C5 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r73 |
50,000,000 |
C76D15DE |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r74 |
50,000,000 |
7F6EE18B |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r75 |
50,000,000 |
4B409637 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r76 |
50,000,000 |
674FC961 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r77 |
50,000,000 |
643A916D |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r78 |
50,000,000 |
F26E281D |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r79 |
50,000,000 |
DB5B7F23 |
bifiso-linux.academy.certified.information.systems.security.professional.cissp.repack.r80 |
1,809,135 |
96E80142 |
|
Total size: |
4,051,809,135 |
|
|
Archived
files |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\01.Getting Started\01.01.Course Introduction.mp4
[1d2dd546a632f4d5]
|
109,563,956 |
9472E853 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\01.Getting Started\01.02.About the Training Architect.mp4
[e3d18b1b05d645b2]
|
21,883,388 |
F4373EAE |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\01.Getting Started\01.03.Course Prerequisites.mp4
[aad78e759a9c2ae8]
|
41,014,080 |
D381375D |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\01.Getting Started\01.04.How to Get Help.mp4
[3d0f164f8004796a]
|
49,099,960 |
3D76671C |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\01.Getting Started |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance\02.01.CIA Triad Confidentiality.mp4
[475b2326b61aee88]
|
178,991,792 |
E535433B |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance\02.02.CIA Triad Integrity.mp4
[edf09e32ca8f0ffb]
|
66,805,612 |
36A37F6C |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance\02.03.CIA Triad Availability.mp4
[8c5843579c19694b]
|
69,966,080 |
92FF2766 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance\02.04.Identification, Authentication, Authorization, Auditing, and Accounting.mp4
[ae117bed70d449c1]
|
36,386,648 |
49F7942B |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance\02.05.Threat Modeling.mp4
[1d7e9699bad942f1]
|
105,023,756 |
AECED5F2 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance\02.06.Security Policies.mp4
[e2b08edd9ab24728]
|
75,478,804 |
6D4A1AA2 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance\02.07.Risk Management Part 1.mp4
[4dfac2df198099d0]
|
75,097,916 |
A27B5AC6 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance\02.08.Risk Management Part 2.mp4
[b5f2dd01206a6dc2]
|
73,763,304 |
6BCB18BE |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance\02.09.Risk Management Part 3.mp4
[3df6a89bd68ec1ba]
|
59,552,572 |
66CED6A9 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\02.Security Governance |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\03.Laws, Regulations, and Ethics\03.01.Laws, Standards and Regulations.mp4
[ecf7211186ca8f3a]
|
139,231,484 |
36DB22DC |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\03.Laws, Regulations, and Ethics\03.02.Professional Ethics.mp4
[2e3108f5cd452615]
|
41,137,032 |
C6378D39 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\03.Laws, Regulations, and Ethics |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\04.Data and Asset Security\04.01.Classifying Data and Assets.mp4
[2d05e41b5af990a5]
|
88,168,992 |
4504AC59 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\04.Data and Asset Security\04.02.Data Ownership.mp4
[19b630bce0744068]
|
74,802,004 |
3C83852C |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\04.Data and Asset Security\04.03.Storing and Disposing of Data.mp4
[804915378a991b0c]
|
73,606,512 |
A15EB341 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\04.Data and Asset Security |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\05.Cryptography\05.01.Introduction.mp4
[8a4e302eb532efb8]
|
52,263,812 |
7041958A |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\05.Cryptography\05.02.Asymmetric and Symmetric Encryption.mp4
[34e4ec75425f1485]
|
30,294,884 |
2C343218 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\05.Cryptography\05.03.Ciphers.mp4
[101d3e1d73b16236]
|
31,578,736 |
209967F6 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\05.Cryptography\05.04.Public Key Infrastructure (PKI).mp4
[107cd773d2672c01]
|
59,724,592 |
38D022AB |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\05.Cryptography\05.05.Hashing Algorithms.mp4
[29da5d99226e0e68]
|
102,682,780 |
54BA9661 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\05.Cryptography\05.06.Cryptographic Attacks.mp4
[958735010a1b8b0d]
|
87,060,356 |
EF6C6A2F |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\05.Cryptography |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\06.Security Models and Design\06.01.Security Design Principles.mp4
[8e6e01570173f7ff]
|
70,031,128 |
AA6F8539 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\06.Security Models and Design\06.02.Security Models.mp4
[d29dcb435f6804ab]
|
22,561,128 |
E9A2769A |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\06.Security Models and Design\06.03.System Security Requirements.mp4
[4cfbb8f15afbb2b]
|
69,467,316 |
1508C6EB |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\06.Security Models and Design\06.04.Physical Security Part 1.mp4
[a9f8536623f834d1]
|
61,995,820 |
4DC2C19A |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\06.Security Models and Design\06.05.Physical Security Part 2.mp4
[13b79d561b99c57d]
|
39,649,200 |
D80354C0 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\06.Security Models and Design |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\07.Threats and Attacks\07.01.Threats vs. Attacks.mp4
[d35ce02e1f3175e7]
|
13,320,552 |
7AF21C4E |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\07.Threats and Attacks\07.02.Motives.mp4
[ca75e0f49bff4e41]
|
58,511,616 |
53E7B5C7 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\07.Threats and Attacks\07.03.Attack Vectors.mp4
[e51f621cc69308fc]
|
117,878,632 |
7C94239A |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\07.Threats and Attacks\07.04.Threat Classification.mp4
[f0c696d70f449d0b]
|
65,608,428 |
0515C281 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\07.Threats and Attacks\07.05.Attack Classification.mp4
[732d866ea23854ce]
|
30,068,532 |
7352DA79 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\07.Threats and Attacks |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\08.Network Architecture\08.01.OSI vs. TCPIP.mp4
[de3533ca3afa6fc]
|
36,950,272 |
DD4FAB88 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\08.Network Architecture\08.02.TCPIP.mp4
[49ed3e80cdd581b7]
|
47,262,260 |
A1D36C6C |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\08.Network Architecture\08.03.Wireless Access Point.mp4
[b4a0c8ad77312e35]
|
139,606,732 |
2F2F08FB |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\08.Network Architecture\08.04.Wireless Network Attacks.mp4
[82b5d8694af88afb]
|
36,626,160 |
59B49F76 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\08.Network Architecture\08.05.Firewalls.mp4
[57ff283ab9d02594]
|
107,413,236 |
0ED03F06 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\08.Network Architecture\08.06.Network Hardware.mp4
[46d5b8769b597041]
|
68,843,908 |
FAD9B7EA |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\08.Network Architecture\08.07.Network Topologies.mp4
[1688d78e438eab4e]
|
23,428,184 |
D23523E2 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\08.Network Architecture |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\09.Network Traffic\09.01.Network Security Mechanisms.mp4
[1e23e4bc4f6f1f83]
|
119,699,976 |
4BBDFFC3 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\09.Network Traffic\09.02.Email Security.mp4
[681c3ac40b6b588e]
|
52,840,972 |
4DD6B374 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\09.Network Traffic\09.03.VPN and Virtualization.mp4
[d1bb1f4117686a87]
|
45,522,508 |
1677E698 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\09.Network Traffic\09.04.Network Address Translation (NAT).mp4
[e023f14e0c795343]
|
14,313,192 |
CF6FD30D |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\09.Network Traffic\09.05.Wide-Area Networks (WANs).mp4
[4c546601d428de2d]
|
26,702,016 |
626DC61F |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\09.Network Traffic\09.06.Network Attack Mitigation.mp4
[5b10c098e24bde5a]
|
56,468,056 |
CBC8E613 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\09.Network Traffic |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\10.Identity and Authentication\10.01.Identification and Authentication Part 1.mp4
[347b6996a3b7c42a]
|
38,059,472 |
5D6FCDD7 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\10.Identity and Authentication\10.02.Identification and Authentication Part 2.mp4
[10b40340a73315eb]
|
17,276,636 |
DD886CF4 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\10.Identity and Authentication\10.03.Identification and Authentication Part 3.mp4
[a094d5c346b6b94]
|
38,439,044 |
362D9243 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\10.Identity and Authentication\10.04.Access Control.mp4
[f41db4331d8d1175]
|
31,652,808 |
EB060026 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\10.Identity and Authentication |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\11.Security Assessments\11.01.Security Assessments and Audits.mp4
[d3de2f3a2da1504b]
|
36,882,968 |
00F12C7E |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\11.Security Assessments\11.02.Penetration Testing.mp4
[f55a6513f6ea8619]
|
90,595,508 |
B865A5B9 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\11.Security Assessments\11.03.Vulnerability Assessments.mp4
[b1674c2551ebbfd]
|
71,316,484 |
E9E2F119 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\11.Security Assessments\11.04.Software Testing.mp4
[fadd4f527388325]
|
48,518,476 |
E198608C |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\11.Security Assessments |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\12.Disaster Prevention, Response, and Recovery\12.01.Security Operations.mp4
[3004e1d6b4d23ea9]
|
131,127,556 |
B951E4EF |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\12.Disaster Prevention, Response, and Recovery\12.02.Responding to Incidents.mp4
[7f2368b8206bbd45]
|
13,355,520 |
435E68B4 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\12.Disaster Prevention, Response, and Recovery\12.03.Log - Monitor - Audit.mp4
[d4e290f363e226ae]
|
34,166,744 |
5E0F60B4 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\12.Disaster Prevention, Response, and Recovery |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\13.Software Development Security Principles\13.01.The Software Development Lifecycle (SDLC).mp4
[c05596d48be4bf7c]
|
40,276,932 |
CC392CE3 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\13.Software Development Security Principles\13.02.Data and Information Storage.mp4
[99e2a3dee06e1679]
|
104,820,904 |
B019A443 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\13.Software Development Security Principles\13.03.Malicious Code Part 1.mp4
[13e6071916be716d]
|
55,336,296 |
C763DE38 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\13.Software Development Security Principles\13.04.Malicious Code Part 2.mp4
[1bd923292df75bdf]
|
31,445,632 |
3A6CEAC9 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\13.Software Development Security Principles |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\14.Final Steps\14.01.How to Prepare for the Exam.mp4
[c03ed7c41c48f7c3]
|
170,448,508 |
189A33C0 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\14.Final Steps\14.02.What's Next After Certification.mp4
[2819aac54c475305]
|
30,110,080 |
A6D8364F |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK\14.Final Steps |
0 |
00000000 |
LINUX.ACADEMY.CERTIFIED.INFORMATION.SYSTEMS.SECURITY.PROFESSIONAL.CISSP.REPACK |
0 |
00000000 |
|
Total size: |
4,051,778,444 |
|
|