RAR-files |
llisfcc-778a-zh.rar |
50,000,000 |
7AC8C69B |
llisfcc-778a-zh.r00 |
50,000,000 |
D4883D1E |
llisfcc-778a-zh.r01 |
50,000,000 |
97313DDA |
llisfcc-778a-zh.r02 |
50,000,000 |
BDE9934F |
llisfcc-778a-zh.r03 |
50,000,000 |
89EA64F5 |
llisfcc-778a-zh.r04 |
27,849,385 |
40039D23 |
|
Total size: |
277,849,385 |
|
|
Archived
files |
IT Security Foundations Core Concepts\02 - Core Security Principles\02 - Managing risk.mp4
[571db2c0aa886b64]
|
10,882,736 |
C210DDA3 |
IT Security Foundations Core Concepts\02 - Core Security Principles\03 - Avoiding scam artists.mp4
[5704a183da16d990]
|
27,633,238 |
03A18D03 |
IT Security Foundations Core Concepts\02 - Core Security Principles\05 - Modeling threats.mp4
[d47949ce73fae5b0]
|
12,573,361 |
6005DFEC |
IT Security Foundations Core Concepts\02 - Core Security Principles\01 - Keeping information safe.mp4
[94d47b2c1fc87cb7]
|
14,529,541 |
BA2552D4 |
IT Security Foundations Core Concepts\02 - Core Security Principles\04 - Analyzing the attack surface.mp4
[79ba2487ebdde82a]
|
16,998,232 |
617FCE6B |
IT Security Foundations Core Concepts\05 - Investigating Internet Security\04 - Avoiding browser threats.mp4
[8d25ea5728ee4d1f]
|
9,425,238 |
4D764624 |
IT Security Foundations Core Concepts\05 - Investigating Internet Security\03 - Blocking malicious content.mp4
[2aaf2242ac31db2a]
|
14,193,497 |
2D520987 |
IT Security Foundations Core Concepts\05 - Investigating Internet Security\02 - Accepting cookies.mp4
[f77fde29692c3568]
|
9,765,211 |
8E5F6789 |
IT Security Foundations Core Concepts\05 - Investigating Internet Security\01 - Using secure websites.mp4
[e300fc11972e60e9]
|
11,060,055 |
D7830935 |
IT Security Foundations Core Concepts\08 - Conclusion\01 - Next steps.mp4
[18d951a0bd20db1]
|
1,930,754 |
E0CEFD9D |
IT Security Foundations Core Concepts\04 - Getting Into Your System\01 - Stopping the imposters.mp4
[3f85a412f92b833]
|
10,913,793 |
D83035DE |
IT Security Foundations Core Concepts\04 - Getting Into Your System\02 - Getting in the backdoor.mp4
[d527d1db5ceef934]
|
8,667,138 |
FA6485CD |
IT Security Foundations Core Concepts\04 - Getting Into Your System\04 - Exploiting the unknown.mp4
[470460f86ea16a89]
|
11,433,644 |
1EC3EA4A |
IT Security Foundations Core Concepts\04 - Getting Into Your System\03 - Overflowing the buffer.mp4
[596c0d5ca861139b]
|
10,701,148 |
0FDB8EFB |
IT Security Foundations Core Concepts\06 - Mobile and Wireless Security\04 - Protecting mobile devices.mp4
[b6932c7fee2de557]
|
12,085,425 |
6B2F6A98 |
IT Security Foundations Core Concepts\06 - Mobile and Wireless Security\01 - Securing your Wi-Fi.mp4
[3d3b08dd5824c6ab]
|
12,084,401 |
B0A22567 |
IT Security Foundations Core Concepts\06 - Mobile and Wireless Security\02 - Sharing a secret.mp4
[c8f41897839b33d]
|
13,366,580 |
A5EF717A |
IT Security Foundations Core Concepts\06 - Mobile and Wireless Security\03 - Concealing your access point.mp4
[2bd4a8709ba0cce3]
|
6,067,201 |
20D74AC8 |
IT Security Foundations Core Concepts\07 - Secure Devices and Applications\01 - Keeping data private.mp4
[eff53131ecd169dc]
|
6,415,364 |
65D6FB12 |
IT Security Foundations Core Concepts\07 - Secure Devices and Applications\02 - Understanding cryptography.mp4
[d451022c358d695f]
|
9,267,376 |
814961E5 |
IT Security Foundations Core Concepts\07 - Secure Devices and Applications\03 - Email security.mp4
[5096e7741d7b3266]
|
4,707,160 |
51377296 |
IT Security Foundations Core Concepts\01 - Introduction\02 - Prepare for MTA Exam 98-367.mp4
[e65309ba219b5bd8]
|
3,524,953 |
905D14CC |
IT Security Foundations Core Concepts\01 - Introduction\01 - Tech savvy, tech safe.mp4
[bb69666e7ba3340a]
|
6,736,985 |
51281BB2 |
IT Security Foundations Core Concepts\03 - Understanding Malware\03 - Holding data hostage.mp4
[e5cf19a0c6953680]
|
11,332,612 |
988E789E |
IT Security Foundations Core Concepts\03 - Understanding Malware\01 - Explaining viruses and worms.mp4
[7b61e25b3f85373]
|
14,259,201 |
91E0C6DF |
IT Security Foundations Core Concepts\03 - Understanding Malware\02 - Eliminating unwanted surveillance.mp4
[49e5fa1297c14451]
|
7,289,346 |
B7639A0A |
IT Security Foundations Core Concepts\02 - Core Security Principles |
0 |
00000000 |
IT Security Foundations Core Concepts\05 - Investigating Internet Security |
0 |
00000000 |
IT Security Foundations Core Concepts\08 - Conclusion |
0 |
00000000 |
IT Security Foundations Core Concepts\04 - Getting Into Your System |
0 |
00000000 |
IT Security Foundations Core Concepts\06 - Mobile and Wireless Security |
0 |
00000000 |
IT Security Foundations Core Concepts\07 - Secure Devices and Applications |
0 |
00000000 |
IT Security Foundations Core Concepts\01 - Introduction |
0 |
00000000 |
IT Security Foundations Core Concepts\03 - Understanding Malware |
0 |
00000000 |
IT Security Foundations Core Concepts |
0 |
00000000 |
|
Total size: |
277,844,190 |
|
|