Knowledge != understanding
  • Anonymous
  • 2018-10-08 19:57:48
  • APPS

RELEASE >

ReScene version pyReScene Auto 0.7 JGTiSO File size CRC
Download
23,799
Stored files
5,930 05F67959
425 A25A8282
RAR-files
jgt-pptmwt.rar 15,000,000 F9BD6D81
jgt-pptmwt.r00 15,000,000 FFEFAFF3
jgt-pptmwt.r01 15,000,000 D099E796
jgt-pptmwt.r02 15,000,000 C809D0ED
jgt-pptmwt.r03 15,000,000 F930DCA2
jgt-pptmwt.r04 15,000,000 2EC1BC11
jgt-pptmwt.r05 15,000,000 49FD10B7
jgt-pptmwt.r06 15,000,000 B2AAFFED
jgt-pptmwt.r07 15,000,000 89D67908
jgt-pptmwt.r08 15,000,000 5B1DE018
jgt-pptmwt.r09 15,000,000 9870372F
jgt-pptmwt.r10 15,000,000 70DDD0E7
jgt-pptmwt.r11 15,000,000 77837A2D
jgt-pptmwt.r12 15,000,000 005CD8A2
jgt-pptmwt.r13 15,000,000 CC1C20B4
jgt-pptmwt.r14 15,000,000 F6299E8D
jgt-pptmwt.r15 13,046,682 6EB7682E

Total size: 253,046,682
Archived files
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\01.Course Overview\0101.Course Overview.mp4 [5cd168eaa3d23d53] 3,682,941 67A02787
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\02.Introduction\0201.Introduction.mp4 [b2546cb8ea06124a] 8,465,931 1BB8BD05
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0301.Introduction.mp4 [cdaa4b6bfba2bf67] 1,690,764 94A03AE3
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0302.Performing a Postmortem on Globomantics' Breach.mp4 [a1da911075bc1282] 8,118,003 6A32FD4B
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0303.Introducing Threat Modeling to Your Organization.mp4 [7ecee668b33cbb35] 8,093,291 DBA2E0CE
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0304.Conducting Threat Modeling Meetings.mp4 [76b75fd102680f0b] 5,030,125 86F6C70E
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0305.Overcoming Objections to Threat Modeling.mp4 [f648261dc257cf30] 9,957,587 89D8E694
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0306.Summary.mp4 [d8e064931a1888b3] 2,016,077 24A809E0
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0401.Introduction.mp4 [e9067264214a335c] 2,065,166 B154FEEC
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0402.Diagramming 101.mp4 [cb9cc3cefbb57884] 5,699,171 C3E8C2B2
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0403.Knowing Your Use Cases.mp4 [ab1f11a20024d5ec] 1,751,614 C2C09547
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0404.Building a Data Flow Diagram.mp4 [d4fd1d8229e602a] 17,522,306 DAC67D69
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0405.Finding Trust Boundaries.mp4 [e2b91a968b082f19] 17,206,830 B23E2640
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0406.Creating a Security Profile.mp4 [ff2e8dcbf4495afc] 2,974,227 BBD3E4D1
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0407.Summary.mp4 [ea25f8d38670a387] 2,209,567 3BCD7E94
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0501.Introduction.mp4 [ae8581a0e8136f66] 1,154,552 AA9978B9
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0502.Defining STRIDE.mp4 [2fa1ba35a16debca] 4,762,993 76232255
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0503.Threat Modeling Using STRIDE.mp4 [5fab8c8018ac3736] 24,214,701 E77AB6BF
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0504.Defining STRIDE-per-element.mp4 [673fe3dc96ad00e2] 3,693,787 84EC5846
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0505.Threat Modeling Using STRIDE-per-element.mp4 [3908a391ad4a1f05] 15,485,897 5D60914F
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0506.Defining STRIDE-per-interaction.mp4 [e4638405dda1ad38] 1,351,344 BB0CC5D6
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0507.Threat Modeling Using STRIDE-per-interaction.mp4 [d50902a77ec9451d] 6,712,456 0FEB3364
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0508.Summary.mp4 [f14dc7c277b35b31] 1,740,900 0894AF89
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0601.Introduction.mp4 [beef83b45afca836] 711,090 3F67FAC4
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0602. Considering Alternatives to STRIDE.mp4 [4c3884742ef13c47] 1,881,844 E6032821
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0603.Defining Attack Trees.mp4 [7df1106fd9eb95c6] 4,960,588 B873BA47
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0604.Defining Attack Libraries.mp4 [3ab0f5d801e38fd5] 6,008,821 7B0FF1A9
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0605.Summary.mp4 [a5dfa9a6670d2fd1] 1,594,072 2AE2494F
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0701.Introduction.mp4 [b21ed57c55436492] 1,060,116 CE9ABA91
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0702.Defining Documentation.mp4 [638ba2526ec21d0] 3,010,347 F8A0D595
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0703.Documenting Threats.mp4 [2145b86884d92c3b] 6,058,601 06C0F394
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0704.Prioritizing Threats Using Risk Ratings.mp4 [63c4296db9268ef8] 5,913,991 6FD417B0
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0705.Summary.mp4 [af07820c862707ba] 1,835,470 25769175
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0801.Introduction.mp4 [28af3c5af154c9ee] 790,866 FFC8EB7D
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0802.How to Deal with Threats.mp4 [91fcb7f9b601df9] 5,121,649 4F112167
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0803.Mitigating Specific Threats.mp4 [ab004634e5b5e7c9] 6,087,589 E1E4A6F3
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0804.Creating Security Controls.mp4 [803465cfad3359e0] 33,838,781 9CE49461
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0805.Summary.mp4 [72217ff857c05479] 2,073,190 7376C1D9
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up\0901.Introduction.mp4 [91aa2be2adf755d3] 756,655 06211B97
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up\0902.Threat Modeling from Start to Finish.mp4 [1d6b15366eef110f] 3,691,003 A39B105E
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up\0903.Practicing Threat Modeling.mp4 [389be6b459dc4e2c] 6,294,514 32B10875
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up\0904.Summary.mp4 [679b4ad5ecdf87d6] 1,416,908 1940118D
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\Exercise Files\microsoft-threat-modeling-methodology-performing.zip 1,818,734 1F3FE65E
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\01.Course Overview 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\02.Introduction 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\Exercise Files 0 00000000
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology 0 00000000

Total size: 250,525,059
RAR Recovery
Present (Protect+) 2,507,006
Labels APPS