BITCQ

OR3

Size: 5.6 GB
Magnet link

Name Size
OR3/001 - Introduction.mp4 22.7 MB
OR3/002 - Introduction.mp4 5.8 MB
OR3/003 - Information Security and Risk Management.mp4 5.8 MB
OR3/004 - Mainframe Days.mp4 10.2 MB
OR3/005 - Today’s Environment.mp4 3.3 MB
OR3/006 - Security Definitions.mp4 3.8 MB
OR3/007 - Examples of Some Vulnerabilities that Are Not Always Obvious.mp4 5.2 MB
OR3/008 - Risk — What Does It Really Mean.mp4 5.1 MB
OR3/009 - Relationships.mp4 3.5 MB
OR3/010 - Who Deals with Risk.mp4 9.7 MB
OR3/011 - AIC Triad.mp4 8.6 MB
OR3/012 - Who Is Watching.mp4 7.2 MB
OR3/013 - Social Engineering.mp4 8.9 MB
OR3/014 - What Security People Are Really Thinking.mp4 4.3 MB
OR3/015 - Security Concepts.mp4 2.9 MB
OR3/016 - Security.mp4 10.1 MB
OR3/017 - The Bad Guys Are Motivated.mp4 5.6 MB
OR3/018 - Open Standards.mp4 3.9 MB
OR3/019 - Without Standards.mp4 2.5 MB
OR3/020 - Controls.mp4 9.2 MB
OR3/021 - Holistic Security.mp4 9.7 MB
OR3/022 - Different Types of Law.mp4 11.8 MB
OR3/023 - How Is Liability Determined.mp4 4.8 MB
OR3/024 - Due Diligence and Due Care.mp4 3.6 MB
OR3/025 - Prudent Person Rule.mp4 10 MB
OR3/026 - Risk Management.mp4 17.7 MB
OR3/027 - Planning Stage — Scope.mp4 4.3 MB
OR3/028 - Planning Stage — Analysis Method.mp4 2.4 MB
OR3/029 - Risk Management Tools.mp4 3.8 MB
OR3/030 - Defining Acceptable Levels.mp4 5.9 MB
OR3/031 - Acceptable Risk Level.mp4 2.1 MB
OR3/032 - Collecting and Analyzing Data Methods.mp4 3.5 MB
OR3/033 - What Is a Company Asset.mp4 2.6 MB
OR3/034 - Data Collection — Identify Assets.mp4 2.1 MB
OR3/035 - Data Collection — Assigning Values.mp4 3.7 MB
OR3/036 - Asset Value.mp4 2.3 MB
OR3/037 - Data Collection — Identify Threats.mp4 3.9 MB
OR3/038 - Data Collection — Calculate Risks.mp4 5.2 MB
OR3/039 - Scenario Based — Qualitative.mp4 1.4 MB
OR3/040 - Risk Approach.mp4 1.1 MB
OR3/041 - Qualitative Analysis Steps.mp4 2.3 MB
OR3/042 - Want Real Answers.mp4 2.7 MB
OR3/043 - Qualitative Risk Analysis.mp4 5.9 MB
OR3/044 - ARO Values.mp4 19.8 MB
OR3/045 - Can a Purely Quantitative Analysis Be Accomplished.mp4 4.8 MB
OR3/046 - Risk Types.mp4 2.2 MB
OR3/047 - Losses.mp4 4.5 MB
OR3/048 - Cost_Benefit Analysis.mp4 2.2 MB
OR3/049 - Cost of a Countermeasure.mp4 4.6 MB
OR3/050 - Cost_Benefit Analysis Countermeasure Criteria.mp4 9.4 MB
OR3/051 - Calculating Cost_Benefit.mp4 2.2 MB
OR3/052 - Controls II.mp4 6.3 MB
OR3/053 - Quantitative Analysis.mp4 5.7 MB
OR3/054 - Can You Get Rid of All Risk.mp4 5.8 MB
OR3/055 - Uncertainty Analysis.mp4 4 MB
OR3/056 - Dealing with Risk.mp4 4.7 MB
OR3/057 - Management’s Response to Identified Risks.mp4 3.5 MB
OR3/058 - Risk Acceptance.mp4 3.1 MB
OR3/059 - Risk Analysis Process Summary.mp4 2.4 MB
OR3/060 - Components of Security Program.mp4 2.4 MB
OR3/061 - A Layered Approach.mp4 3 MB
OR3/062 - In Security, You Never Want Any Surprises.mp4 3 MB
OR3/063 - Building Foundation.mp4 1.5 MB
OR3/064 - Security Roadmap.mp4 6.6 MB
OR3/065 - Functional and Assurance Requirements.mp4 3.1 MB
OR3/066 - Most Organizations.mp4 7.8 MB
OR3/067 - Silo Security Structure.mp4 4.7 MB
OR3/068 - Security Is a Process.mp4 3.5 MB
OR3/069 - Approach to Security Management.mp4 2 MB
OR3/070 - Result of Battling Management.mp4 1.5 MB
OR3/071 - Industry Best Practices Standards.mp4 4.5 MB
OR3/072 - Pieces and Parts.mp4 2.2 MB
OR3/073 - Numbering.mp4 3.6 MB
OR3/074 - New ISO Standards.mp4 4.8 MB
OR3/075 - COBIT.mp4 5.6 MB
OR3/076 - Measurements.mp4 1.2 MB
OR3/077 - Information Technology Infrastructure Library.mp4 6.7 MB
OR3/078 - Security Governance.mp4 14.9 MB
OR3/079 - Security Program Components.mp4 1.3 MB
OR3/080 - Policy Framework.mp4 14.3 MB
OR3/081 - Standards.mp4 11.2 MB
OR3/082 - Data Collection for Metrics.mp4 5.8 MB
OR3/083 - Tying Them Together.mp4 3.8 MB
OR3/084 - Entity Relationships.mp4 357 KB
OR3/085 - Senior Management’s Role.mp4 3.6 MB
OR3/086 - Security Roles.mp4 12.8 MB
OR3/087 - Information Classification.mp4 2 MB
OR3/088 - Data Leakage.mp4 2.4 MB
OR3/089 - Do You Want to End Up In the News.mp4 2.2 MB
OR3/090 - Types of Classification Levels.mp4 2.6 MB
OR3/091 - Data Protection Levels.mp4 1.8 MB
OR3/092 - Classification Program Steps.mp4 9.4 MB
OR3/093 - Classification Levels.mp4 7.1 MB
OR3/094 - Information Owner Requirements.mp4 2.8 MB
OR3/095 - Clearly Labeled.mp4 3.4 MB
OR3/096 - Testing Classification Program.mp4 1.8 MB
OR3/097 - Employee Management.mp4 923 KB
OR3/098 - Employee Position and Management.mp4 2.4 MB
OR3/099 - Hiring and Firing Issues.mp4 5.2 MB
OR3/100 - Unfriendly Termination.mp4 7.5 MB
OR3/101 - Security Awareness and Training.mp4 3.8 MB
OR3/102 - Training Characteristics.mp4 3.3 MB
OR3/103 - Security Enforcement Issues.mp4 2.9 MB
OR3/104 - Answer This Question.mp4 4.6 MB
OR3/105 - Domain 1 Review.mp4 10.9 MB
OR3/106 - Access Control.mp4 2.6 MB
OR3/107 - Agenda 1.mp4 5.6 MB
OR3/108 - Access Control Mechanism Examples.mp4 4.5 MB
OR3/109 - Technical Controls.mp4 1.7 MB
OR3/110 - Access Control Characteristics.mp4 7.3 MB
OR3/111 - Preventive Controls.mp4 5.3 MB
OR3/112 - Control Combinations.mp4 1007 KB
OR3/113 - Detective — Administrative Control.mp4 9.6 MB
OR3/114 - Detective Examples.mp4 1.5 MB
OR3/115 - Administrating Access Control.mp4 7.2 MB
OR3/116 - Authorization Creep.mp4 4.5 MB
OR3/117 - Accountability and Access Control.mp4 6.1 MB
OR3/118 - Trusted Path.mp4 15.2 MB
OR3/119 - Fake Login Pages Look Convincing.mp4 3.6 MB
OR3/120 - Who Are You.mp4 9.5 MB
OR3/121 - Identification Issues.mp4 3.6 MB
OR3/122 - Authentication Mechanisms Characteristics.mp4 3.4 MB
OR3/123 - Strong Authentication.mp4 3.9 MB
OR3/124 - Fraud Controls.mp4 5 MB
OR3/125 - Internal Control Tool - Separation of Duties.mp4 3.4 MB
OR3/126 - Authentication Mechanisms in Use Today.mp4 5.8 MB
OR3/127 - Verification Steps.mp4 2.9 MB
OR3/128 - What a Person Is.mp4 1.5 MB
OR3/129 - Why Use Biometrics.mp4 4.6 MB
OR3/130 - Identification or Authentication.mp4 2.9 MB
OR3/131 - Iris Sampling.mp4 1.9 MB
OR3/132 - Finger Scan.mp4 1.6 MB
OR3/133 - Hand Geometry.mp4 7.3 MB
OR3/134 - Downfalls to Biometric Use.mp4 4.5 MB
OR3/135 - Biometrics Error Types.mp4 4.4 MB
OR3/136 - Crossover Error Rate.mp4 8.6 MB
OR3/137 - Biometric System Types.mp4 7.7 MB
OR3/138 - Passwords.mp4 21.8 MB
OR3/139 - Password Attacks.mp4 5.6 MB
OR3/140 - Attack Steps.mp4 5.1 MB
OR3/141 - Many Tools to Break Your Password.mp4 2 MB
OR3/142 - Rainbow Table.mp4 2.9 MB
OR3/143 - Passwords Should NOT Contain….mp4 3.9 MB
OR3/144 - Countermeasures for Password Cracking.mp4 5.2 MB
OR3/145 - Cognitive Passwords.mp4 1.7 MB
OR3/146 - One-Time Password Authentication.mp4 8.1 MB
OR3/147 - Synchronous Token.mp4 4.9 MB
OR3/148 - One Type of Solution.mp4 5.8 MB
OR3/149 - Administrator Configures.mp4 414 KB
OR3/150 - Challenge Response Authentication.mp4 7.2 MB
OR3/151 - Asynchronous Token Device.mp4 7.4 MB
OR3/152 - Challenge Response Authentication.mp4 640 KB
OR3/153 - Cryptographic Keys.mp4 3.6 MB
OR3/154 - Passphrase Authentication.mp4 3 MB
OR3/155 - Key Protection.mp4 939 KB
OR3/156 - Memory Cards.mp4 7.3 MB
OR3/157 - Memory Card Characteristics.mp4 1.9 MB
OR3/158 - Smart Card.mp4 1.8 MB
OR3/159 - Characteristics.mp4 6 MB
OR3/160 - Card Types.mp4 1.6 MB
OR3/161 - Smart Card Attacks.mp4 8 MB
OR3/162 - Software Attack.mp4 2.2 MB
OR3/163 - Side Channel Attack.mp4 3.2 MB
OR3/164 - Side Channel Data Collection.mp4 1.8 MB
OR3/165 - Microprobing.mp4 4.6 MB
OR3/166 - Identity Management.mp4 10.6 MB
OR3/167 - How Are These Entities Controlled.mp4 1.8 MB
OR3/168 - Some Current Issues.mp4 6.4 MB
OR3/169 - Management.mp4 13.7 MB
OR3/170 - Typical Chaos.mp4 1.5 MB
OR3/171 - Different Identities.mp4 3.8 MB
OR3/172 - Identity Management Technologies.mp4 3.5 MB
OR3/173 - Directory Component.mp4 6.3 MB
OR3/174 - Enterprise Directory.mp4 1.6 MB
OR3/175 - Directory Responsibilities.mp4 5.2 MB
OR3/176 - Authoritative Sources.mp4 9.5 MB
OR3/177 - Meta Directory.mp4 5.1 MB
OR3/178 - Directory Interactions.mp4 3.4 MB
OR3/179 - Web Access Management.mp4 7.4 MB
OR3/180 - Web Access.mp4 9.6 MB
OR3/181 - Password Management.mp4 12.1 MB
OR3/182 - Legacy Single Sign-On.mp4 14.4 MB
OR3/183 - Account Management Systems.mp4 12.7 MB
OR3/184 - Provisioning Component.mp4 14.4 MB
OR3/185 - Profile Update.mp4 7.9 MB
OR3/186 - Working Together.mp4 7 MB
OR3/187 - Enterprise Directory.mp4 1.8 MB
OR3/188 - Identity Management Solution Components.mp4 12.3 MB
OR3/189 - Federated Identity.mp4 11.8 MB
OR3/190 - Identity Theft.mp4 6.7 MB
OR3/191 - Fake Login Tools.mp4 4.6 MB
OR3/192 - Instructional Emails.mp4 7.1 MB
OR3/193 - Knowing What You Are Disposing of Is Important.mp4 2.6 MB
OR3/194 - Other Examples.mp4 1.8 MB
OR3/195 - Another Danger to Be Aware of… Spyware.mp4 11 MB
OR3/196 - Is Someone Watching You.mp4 5.4 MB
OR3/197 - What Does This Have to Do with My Computer.mp4 3.2 MB
OR3/198 - New Spyware Is Being Identified Every Week.mp4 5.4 MB
OR3/199 - How to Prevent Spyware.mp4 6.6 MB
OR3/200 - Different Technologies.mp4 1.7 MB
OR3/201 - Single Sign-on Technology.mp4 15.1 MB
OR3/202 - Security Domain.mp4 7.6 MB
OR3/203 - Domains of Trust.mp4 2.1 MB
OR3/204 - Thin Clients.mp4 5.1 MB
OR3/205 - Example.mp4 2.4 MB
OR3/206 - Kerberos as a Single Sign-on Technology.mp4 20.9 MB
OR3/207 - Tickets.mp4 12.8 MB
OR3/208 - Why Go Through All of this Trouble.mp4 5 MB
OR3/209 - Issues Pertaining to Kerberos.mp4 3.1 MB
OR3/210 - Kerberos Issues.mp4 3.3 MB
OR3/211 - SESAME as a Single Sign-on Technology.mp4 2.9 MB
OR3/212 - SESAME Steps for Authentication.mp4 4.3 MB
OR3/213 - Combo.mp4 2.5 MB
OR3/214 - Models for Access.mp4 4 MB
OR3/215 - Access Control Models.mp4 4.7 MB
OR3/216 - ACL Access.mp4 2.9 MB
OR3/217 - File Permissions.mp4 5.6 MB
OR3/218 - Security Issues.mp4 6.6 MB
OR3/219 - Mandatory Access Control Model.mp4 4.3 MB
OR3/220 - MAC Enforcement Mechanism — Labels.mp4 10.8 MB
OR3/221 - Formal Model.mp4 1.7 MB
OR3/222 - Software and Hardware.mp4 4.8 MB
OR3/223 - Software and Hardware Guards.mp4 6.2 MB
OR3/224 - MAC versus DAC.mp4 2 MB
OR3/225 - Role-Based Access Control.mp4 4.9 MB
OR3/226 - RBAC Hierarchy.mp4 5.5 MB
OR3/227 - Rule-Based Access Control.mp4 12 MB
OR3/228 - Firewall Example.mp4 554 KB
OR3/229 - Access Control Matrix.mp4 4.3 MB
OR3/230 - Temporal Access Control.mp4 4.4 MB
OR3/231 - Access Control Administration.mp4 9.4 MB
OR3/232 - Remote Centralized Administration.mp4 7.7 MB
OR3/233 - RADIUS.mp4 4.5 MB
OR3/234 - RADIUS Characteristics.mp4 2.8 MB
OR3/235 - TACACS+ Characteristics.mp4 8.6 MB
OR3/236 - Diameter Characteristics.mp4 12.5 MB
OR3/237 - Diameter Protocol.mp4 2.1 MB
OR3/238 - Mobile IP.mp4 8.6 MB
OR3/239 - Diameter Architecture.mp4 3 MB
OR3/240 - Two Pieces.mp4 2.2 MB
OR3/241 - AVP.mp4 7.3 MB
OR3/242 - Decentralized Access Control Administration.mp4 9.2 MB
OR3/243 - Controlling Access to Sensitive Data.mp4 15.8 MB
OR3/244 - IDS.mp4 4.6 MB
OR3/245 - IDS Steps.mp4 2.7 MB
OR3/246 - Network IDS Sensors.mp4 4.5 MB
OR3/247 - Host IDS.mp4 3.8 MB
OR3/248 - Combination.mp4 3 MB
OR3/249 - Types of IDSs.mp4 10.4 MB
OR3/250 - Signature-Based Example.mp4 4.3 MB
OR3/251 - Behavior-Based IDS.mp4 14.1 MB
OR3/252 - Statistical Anomaly.mp4 4.2 MB
OR3/253 - Statistical IDS.mp4 3 MB
OR3/254 - Protocol Anomaly.mp4 4.4 MB
OR3/255 - What Is a Protocol Anomaly.mp4 2.7 MB
OR3/256 - Protocol Anomaly Issues.mp4 3.2 MB
OR3/257 - Traffic Anomaly.mp4 15.9 MB
OR3/258 - IDS Response Mechanisms.mp4 4.4 MB
OR3/259 - Responses to Attacks.mp4 3.2 MB
OR3/260 - IDS Issues.mp4 12.7 MB
OR3/261 - Vulnerable IDS.mp4 10.2 MB
OR3/262 - Domain 2 Review.mp4 8.3 MB
OR3/263 - Cryptography.mp4 7.1 MB
OR3/264 - Services Provided by Cryptography.mp4 4 MB
OR3/265 - Cryptographic Definitions.mp4 4.4 MB
OR3/266 - Cipher.mp4 3.4 MB
OR3/267 - A Few More Definitions.mp4 7.3 MB
OR3/268 - Symmetric Cryptography — Use of Secret Keys.mp4 5.1 MB
OR3/269 - Scytale Cipher.mp4 2.3 MB
OR3/270 - Substitution Ciphers.mp4 6.9 MB
OR3/271 - Simple Substitution Cipher Atbash.mp4 3.4 MB
OR3/272 - Caesar Cipher Example.mp4 3.5 MB
OR3/273 - Simple Substitution Cipher ROT13.mp4 3.3 MB
OR3/274 - Historical Uses.mp4 6.5 MB
OR3/275 - Vigenere Algorithm.mp4 4.5 MB
OR3/276 - Enigma Machine.mp4 15.5 MB
OR3/277 - Historical Uses of Symmetric Cryptography — Running Key and Concealment.mp4 7 MB
OR3/278 - Agenda 1.mp4 809 KB
OR3/279 - Transposition Ciphers.mp4 2.8 MB
OR3/280 - Key and Algorithm Relationship.mp4 8.8 MB
OR3/281 - Ways of Breaking Cryptosystems — Brute Force.mp4 7.1 MB
OR3/282 - Brute Force Components.mp4 2.8 MB
OR3/283 - Ways of Breaking Cryptosystems — Frequency Analysis.mp4 4 MB
OR3/284 - Strength of a Cryptosystem.mp4 8.2 MB
OR3/285 - Developing Cryptographic Solutions In-House.mp4 4.4 MB
OR3/286 - Characteristics of Strong Algorithms.mp4 7.1 MB
OR3/287 - Open or Closed More Secure.mp4 5 MB
OR3/288 - Types of Ciphers Used Today.mp4 3.7 MB
OR3/289 - S-Boxes Used in Block Ciphers.mp4 3.1 MB
OR3/290 - Binary Mathematical Function 1.mp4 3.1 MB
OR3/291 - Type of Symmetric Cipher — Stream Cipher.mp4 2.7 MB
OR3/292 - Symmetric Characteristics.mp4 1.5 MB
OR3/293 - Initialization Vectors.mp4 5.9 MB
OR3/294 - Security Holes.mp4 19.5 MB
OR3/295 - Strength of a Stream Cipher.mp4 7.3 MB
OR3/296 - Out-of-Band Transmission.mp4 3.1 MB
OR3/297 - Symmetric Key Management Issue.mp4 6.3 MB
OR3/298 - Asymmetric Cryptography.mp4 3.3 MB
OR3/299 - Key Functions.mp4 3.2 MB
OR3/300 - Public Key Cryptography Advantages.mp4 6.4 MB
OR3/301 - Asymmetric Algorithm Disadvantages.mp4 4.6 MB
OR3/302 - Confusing Names.mp4 5.2 MB
OR3/303 - Symmetric versus Asymmetric.mp4 2.1 MB
OR3/304 - Questions 1.mp4 14.9 MB
OR3/305 - When to Use Which Key.mp4 5.3 MB
OR3/306 - Encryption Steps.mp4 4.1 MB
OR3/307 - Receiver’s Public Key Is Used to Encrypt the Symmetric Key.mp4 1.3 MB
OR3/308 - Receiver’s Private Key Is Used to Decrypt the Symmetric Key.mp4 2.5 MB
OR3/309 - Digital Envelope.mp4 3.2 MB
OR3/310 - Secret versus Session Keys.mp4 3.7 MB
OR3/311 - Asymmetric Algorithms We Will Dive Into.mp4 5 MB
OR3/312 - Diffie-Hellman.mp4 12.7 MB
OR3/313 - Key Agreement Schemes.mp4 2.8 MB
OR3/314 - Asymmetric Algorithm — RSA.mp4 3.9 MB
OR3/315 - Factoring Large Numbers.mp4 3.1 MB
OR3/316 - RSA Operations.mp4 2.3 MB
OR3/317 - RSA Key Size.mp4 1.9 MB
OR3/318 - El Gamal.mp4 4.7 MB
OR3/319 - Asymmetric Mathematics.mp4 13.1 MB
OR3/320 - Asymmetric Security.mp4 2.4 MB
OR3/321 - Mathematics.mp4 22.6 MB
OR3/322 - Block Cipher.mp4 2.3 MB
OR3/323 - Double DES.mp4 6.3 MB
OR3/324 - Evolution of DES.mp4 2 MB
OR3/325 - Modes of 3DES.mp4 2.6 MB
OR3/326 - Encryption Modes.mp4 6.4 MB
OR3/327 - Block Cipher Modes — CBC.mp4 5.5 MB
OR3/328 - Different Modes of Block Ciphers — ECB.mp4 2.9 MB
OR3/329 - ECB versus CBC.mp4 1.8 MB
OR3/330 - Block Cipher Modes — CFB and OFB.mp4 14.4 MB
OR3/331 - CFB and OFB Modes.mp4 3.3 MB
OR3/332 - Counter Mode.mp4 7 MB
OR3/333 - Modes Summary.mp4 6 MB
OR3/334 - Symmetric Ciphers.mp4 7.1 MB
OR3/335 - Data Integrity.mp4 2.8 MB
OR3/336 - Hashing Steps.mp4 1.8 MB
OR3/337 - Protecting the Integrity of Data.mp4 3.7 MB
OR3/338 - Hashing Algorithms.mp4 4.7 MB
OR3/339 - Data Integrity Mechanisms.mp4 2.9 MB
OR3/340 - Hashing Strength.mp4 2.1 MB
OR3/341 - Question 1.mp4 1.1 MB
OR3/342 - Weakness In Using Only Hash Algorithms.mp4 1.8 MB
OR3/343 - More Protection In Data Integrity.mp4 2.2 MB
OR3/344 - MAC.mp4 2.7 MB
OR3/345 - HMAC — Sender.mp4 4.1 MB
OR3/346 - Another Look.mp4 2 MB
OR3/347 - What Services.mp4 3.3 MB
OR3/348 - CBC-MAC.mp4 2.5 MB
OR3/349 - MAC Using Block Ciphers.mp4 3.6 MB
OR3/350 - Integrity.mp4 1.8 MB
OR3/351 - What Services.mp4 5.1 MB
OR3/352 - Question 2.mp4 5.3 MB
OR3/353 - Digital Signatures.mp4 5.9 MB
OR3/354 - U.S. Government Standard.mp4 2.3 MB
OR3/355 - What Is….mp4 1.1 MB
OR3/356 - Not Giving Up the Farm.mp4 3.4 MB
OR3/357 - Zero Knowledge Proof.mp4 4.2 MB
OR3/358 - Message Integrity Controls.mp4 2 MB
OR3/359 - Security Issues In Hashing.mp4 2.9 MB
OR3/360 - Example of a Birthday Attack.mp4 11.9 MB
OR3/361 - Birthday Attack Issues.mp4 3.2 MB
OR3/362 - Key Management.mp4 5.1 MB
OR3/363 - Key Usage.mp4 4.8 MB
OR3/364 - M-of-N.mp4 6.6 MB
OR3/365 - Key Types.mp4 2.7 MB
OR3/366 - Why Do We Need a PKI.mp4 4.5 MB
OR3/367 - PKI and Its Components.mp4 5.3 MB
OR3/368 - RA Roles.mp4 8.4 MB
OR3/369 - CA.mp4 4.7 MB
OR3/370 - Digital Certificates.mp4 4.7 MB
OR3/371 - Certificate.mp4 1.5 MB
OR3/372 - Signing the Certificate.mp4 1.7 MB
OR3/373 - Verifying the Certificate.mp4 7.2 MB
OR3/374 - Trusted CA’s.mp4 5.4 MB
OR3/375 - Non-Trusted CA.mp4 6.5 MB
OR3/376 - What Do You Do with a Certificate.mp4 18.4 MB
OR3/377 - Components of PKI, Repository, and CRLs.mp4 8.6 MB
OR3/378 - Revoked.mp4 6.7 MB
OR3/379 - CRL Process.mp4 4.9 MB
OR3/380 - Different Uses for Certificates.mp4 4.6 MB
OR3/381 - Cross Certification.mp4 6.6 MB
OR3/382 - PKI and Trust.mp4 6.4 MB
OR3/383 - Historical Uses of Symmetric Cryptography.mp4 5.3 MB
OR3/384 - Binary Mathematical Function 2.mp4 5 MB
OR3/385 - One-Time Pad in Action.mp4 1.7 MB
OR3/386 - One-Time Pad Characteristics.mp4 8.9 MB
OR3/387 - Steganography.mp4 7.2 MB
OR3/388 - Digital Watermarking.mp4 2.6 MB
OR3/389 - Link versus End-to-End Encryption.mp4 7.3 MB
OR3/390 - End-to-End Encryption.mp4 5.5 MB
OR3/391 - Encryption Location.mp4 2.2 MB
OR3/392 - Email Standards.mp4 5.4 MB
OR3/393 - You Decide.mp4 4.8 MB
OR3/394 - Non-Hierarchical.mp4 3 MB
OR3/395 - Secure Protocols.mp4 4.4 MB
OR3/396 - SSL Connection Setup.mp4 10.4 MB
OR3/397 - Example — SSL.mp4 1.8 MB
OR3/398 - Validating Certificate.mp4 1.8 MB
OR3/399 - Secure Protocols (Cont.).mp4 7.7 MB
OR3/400 - SSL and the OSI Model.mp4 3.3 MB
OR3/401 - E-Commerce.mp4 8.5 MB
OR3/402 - How Are You Doing.mp4 5.3 MB
OR3/403 - Secure Email Standard.mp4 5.1 MB
OR3/404 - Network Layer Protection.mp4 10.9 MB
OR3/405 - IPSec Key Management.mp4 4.3 MB
OR3/406 - IPSec Handshaking Process.mp4 3.8 MB
OR3/407 - VPN Establishment.mp4 3.4 MB
OR3/408 - SAs In Use.mp4 6.6 MB
OR3/409 - Key Issues within IPSec.mp4 6.4 MB
OR3/410 - Configuration of SA Parameters.mp4 2 MB
OR3/411 - IPSec Configuration Options.mp4 1.6 MB
OR3/412 - IPSec Is a Suite of Protocols.mp4 11.2 MB
OR3/413 - AH and ESP Modes.mp4 4.2 MB
OR3/414 - IPSec Modes of Operation.mp4 2.7 MB
OR3/415 - VPN Establishment (Cont.).mp4 4.3 MB
OR3/416 - Review.mp4 3.9 MB
OR3/417 - Questions 2.mp4 7.3 MB
OR3/418 - Attack Types.mp4 2.1 MB
OR3/419 - Attacks on Cryptosystems.mp4 2.9 MB
OR3/420 - Known-Plaintext Attack.mp4 6.3 MB
OR3/421 - Chosen-Plaintext Attack.mp4 3.9 MB
OR3/422 - Chosen-Ciphertext Attack.mp4 4.3 MB
OR3/423 - Adaptive Attacks.mp4 2 MB
OR3/424 - Side Channel Attacks.mp4 4.4 MB
OR3/425 - Domain 3 Review.mp4 10.9 MB
OR3/426 - Physical Security.mp4 2.8 MB
OR3/427 - Different Types of Threats.mp4 1.4 MB
OR3/428 - Wake Up Call.mp4 2.9 MB
OR3/429 - Legal Issues.mp4 2.2 MB
OR3/430 - Physical Security Program Goals.mp4 3.8 MB
OR3/431 - Planning Process.mp4 5 MB
OR3/432 - Deterrence.mp4 2.9 MB
OR3/433 - Delay.mp4 570 KB
OR3/434 - Layered Defense Model.mp4 4.8 MB
OR3/435 - Weak Link In the Chain.mp4 1.3 MB
OR3/436 - Threat Categories.mp4 3.3 MB
OR3/437 - Crime Prevention Through Environmental Design.mp4 12.9 MB
OR3/438 - Construction Materials.mp4 13.1 MB
OR3/439 - Security Zones.mp4 16.7 MB
OR3/440 - Entrance Protection.mp4 18.3 MB
OR3/441 - Perimeter Security — Security Guards.mp4 15.3 MB
OR3/442 - Types of Physical Intrusion Detection Systems.mp4 9.2 MB
OR3/443 - Alarm Systems.mp4 12.3 MB
OR3/444 - Electrical Power.mp4 16.9 MB
OR3/445 - Fire Prevention.mp4 33 MB
OR3/446 - Domain 4 Review.mp4 33.4 MB
OR3/447 - Security Architecture and Design.mp4 8 MB
OR3/448 - Central Processing Unit (CPU).mp4 3.3 MB
OR3/449 - Registers.mp4 6.9 MB
OR3/450 - Trust Levels and Processes.mp4 5.8 MB
OR3/451 - Interrupts.mp4 7.4 MB
OR3/452 - Bussses.mp4 4.5 MB
OR3/453 - Multiprocessing and Multitasking.mp4 18.5 MB
OR3/454 - Memory Types.mp4 28.9 MB
OR3/455 - CPU and OS.mp4 44.3 MB
OR3/456 - Trusted Computing Base.mp4 33.5 MB
OR3/457 - Security Levels.mp4 11.6 MB
OR3/458 - Enterprise Architecture.mp4 38.8 MB
OR3/459 - Access Control Models.mp4 14.9 MB
OR3/460 - Bell-LaPadula.mp4 37.9 MB
OR3/461 - Clark-Wilson Model.mp4 9.4 MB
OR3/462 - Non-Interference Model.mp4 10.4 MB
OR3/463 - Access Control Matrix Model.mp4 10.3 MB
OR3/464 - Trusted Computer System Evaluation Criteria (TCSEC).mp4 28.5 MB
OR3/465 - Domain 5 Review.mov 39.8 MB
OR3/466 - Law, Investigation and Ethics.mp4 5.6 MB
OR3/467 - Examples of Computer Crimes.mp4 2 MB
OR3/468 - Who Perpetrates These Crimes.mp4 6 MB
OR3/469 - A Few Attack Types.mp4 12.9 MB
OR3/470 - Privacy of Sensitive Data.mp4 17.1 MB
OR3/471 - Different Types of Laws.mp4 10.7 MB
OR3/472 - Computer Crime and Its Barriers.mp4 35.2 MB
OR3/473 - Preparing for a Crime Before It Happens.mp4 61.2 MB
OR3/474 - Domain 6 Review.mp4 40.8 MB
OR3/475 - Telecommunications and Networking.mp4 2.4 MB
OR3/476 - OSI Model.mp4 10.9 MB
OR3/477 - Networking Communications.mp4 8.1 MB
OR3/478 - Application Layer.mp4 5.3 MB
OR3/479 - Presentation Layer.mp4 8.3 MB
OR3/480 - OSI — Session Layer.mp4 7.8 MB
OR3/481 - Transport Layer.mp4 12.7 MB
OR3/482 - Network Layer.mp4 5 MB
OR3/483 - Data Link Layer.mp4 14.8 MB
OR3/484 - Physical Layer.mp4 6.1 MB
OR3/485 - Layers Working Together.mp4 21.7 MB
OR3/486 - Network Topologies.mp4 25.3 MB
OR3/487 - LAN Media Access Technologies.mp4 10.1 MB
OR3/488 - Media Access Technologies.mp4 44.4 MB
OR3/489 - Cabling Types-Coaxial.mp4 3 MB
OR3/490 - Cabling Types — Twisted Pair.mp4 4 MB
OR3/491 - Types of Cabling — Fiber.mp4 3.5 MB
OR3/492 - Signal and Cable Issues.mp4 6.1 MB
OR3/493 - Transmission Types.mp4 22.1 MB
OR3/494 - Network Technologies.mp4 7.2 MB
OR3/495 - Networking Devices.mp4 16.5 MB
OR3/496 - Virtual LANs.mp4 8.2 MB
OR3/497 - Sniffers.mp4 8.5 MB
OR3/498 - Networking Devices — Router.mp4 4.5 MB
OR3/499 - Hops.mp4 1.6 MB
OR3/500 - Routers.mp4 4 MB
OR3/501 - Bridges Compared to Routers.mp4 3.6 MB
OR3/502 - Port and Protocol Relationship.mp4 10.8 MB
OR3/503 - TCP_IP Suite.mp4 2.4 MB
OR3/504 - UDP versus TCP.mp4 7.9 MB
OR3/505 - TCP Segment.mp4 1.8 MB
OR3/506 - SYN Flood.mp4 9.9 MB
OR3/507 - Teardrop Attack.mp4 6.6 MB
OR3/508 - Source Routing.mp4 3.5 MB
OR3/509 - Source Routing Types.mp4 2.6 MB
OR3/510 - IP Address Ranges.mp4 6.7 MB
OR3/511 - IPv6.mp4 6.7 MB
OR3/512 - Protocols.mp4 305 KB
OR3/513 - Protocols — ARP.mp4 2.1 MB
OR3/514 - IP to MAC Mapping.mp4 1.5 MB
OR3/515 - How ARP Works.mp4 2.8 MB
OR3/516 - ARP Poisoning.mp4 2.4 MB
OR3/517 - ICMP Packets.mp4 2.6 MB
OR3/518 - A Way Hackers Use ICMP.mp4 2.7 MB
OR3/519 - Ping Steps.mp4 2.6 MB
OR3/520 - Protocols — SNMP.mp4 2.3 MB
OR3/521 - SNMP In Action.mp4 5.3 MB
OR3/522 - SNMP.mp4 4 MB
OR3/523 - SNMP Output.mp4 2.2 MB
OR3/524 - POP3 and SMTP.mp4 2.7 MB
OR3/525 - Mail Relay.mp4 6.3 MB
OR3/526 - Protocols — FTP, TFTP, Telnet.mp4 5.6 MB
OR3/527 - Protocols — RARP and BootP.mp4 2.6 MB
OR3/528 - DHCP — Dynamic Host Configuration Protocol.mp4 3 MB
OR3/529 - Networking Device — Bastion Host.mp4 14.6 MB
OR3/530 - Network Devices — Firewalls.mp4 22.1 MB
OR3/531 - Rule Set Example.mp4 2.9 MB
OR3/532 - Firewall Types — Proxy Firewalls.mp4 8.5 MB
OR3/533 - Firewall Types — Circuit-Level Proxy Firewall.mp4 8.6 MB
OR3/534 - Circuit-Level Proxy.mp4 23 MB
OR3/535 - Dedicated Proxy Servers.mp4 63.8 MB
OR3/536 - Dial-Up Protocols and Authentication Protocols.mp4 17.8 MB
OR3/537 - Authentication Protocols.mp4 35.1 MB
OR3/538 - Virtual Private Network Technologies.mp4 49.5 MB
OR3/539 - SDLC and HDLC.mp4 14.5 MB
OR3/540 - Quality of Service (QoS).mp4 5.5 MB
OR3/541 - Autonomous Systems.mp4 5.6 MB
OR3/542 - Routing Protocols.mp4 30.6 MB
OR3/543 - Routing Protocol Attacks.mp4 42.1 MB
OR3/544 - Network Service — NAT.mp4 18.3 MB
OR3/545 - WAN Technologies Are Circuit or Packet Switched.mp4 5.3 MB
OR3/546 - PSTN.mp4 6.3 MB
OR3/547 - Multiplexing.mp4 3.9 MB
OR3/548 - Types of Multiplexing.mp4 11.2 MB
OR3/549 - Packet Switching.mp4 16.8 MB
OR3/550 - WAN Technologies — Packet Switched.mp4 613 KB
OR3/551 - WAN Technologies — X.25.mp4 1.8 MB
OR3/552 - X.25.mp4 5.2 MB
OR3/553 - WAN Technologies — Frame Relay.mp4 8.6 MB
OR3/554 - WAN Example.mp4 1.5 MB
OR3/555 - Frame Relay.mp4 11.3 MB
OR3/556 - WAN Technologies — ATM.mp4 3 MB
OR3/557 - Cell Switching.mp4 1.6 MB
OR3/558 - Wide Area Network Technologies.mp4 9.8 MB
OR3/559 - WAN Technologies — Cable Modem.mp4 4 MB
OR3/560 - Cable Modems and Satellites.mp4 7 MB
OR3/561 - Network Perimeter Security.mp4 4.7 MB
OR3/562 - Complexity Only Increases.mp4 2.2 MB
OR3/563 - Agenda 9.mp4 4.3 MB
OR3/564 - PSTN (Cont.).mp4 4 MB
OR3/565 - Private Branch Exchange.mp4 3.7 MB
OR3/566 - PBX Vulnerabilities.mp4 4.5 MB
OR3/567 - PBX Best Practices.mp4 4.6 MB
OR3/568 - IP Telephony.mp4 27.5 MB
OR3/569 - Mobile Phone Security.mp4 3.7 MB
OR3/570 - Mobile Device Security.mov 2.3 MB
OR3/571 - Cell Phone.mp4 9.7 MB
OR3/572 - Wireless Technologies.mp4 29.2 MB
OR3/573 - OFDM.mp4 6 MB
OR3/574 - 802.11n.mp4 4.2 MB
OR3/575 - Wireless Technologies — Access Point (Cont.).mp4 2.3 MB
OR3/576 - Architectures.mp4 1.5 MB
OR3/577 - Wireless Technologies — Service Set ID.mp4 4 MB
OR3/578 - Authenticating to an AP.mp4 2.9 MB
OR3/579 - 802.11 Authentication.mp4 4.8 MB
OR3/580 - Wireless Technologies — WEP Woes.mp4 13.9 MB
OR3/581 - 802.11 Security Solutions.mp4 20.9 MB
OR3/582 - Types of 802.11 Security.mp4 6.6 MB
OR3/583 - Wireless EAP.mp4 46.1 MB
OR3/584 - Wireless Technologies — WAP and WTLS.mp4 7.5 MB
OR3/585 - Instant Messaging.mp4 4.9 MB
OR3/586 - Domain 7 Review.mp4 7.9 MB
OR3/587 - Business Continuity.mp4 5.5 MB
OR3/588 - Needs for BCP.mp4 10.7 MB
OR3/589 - 9_11 Changed Mentalities About BCP.mp4 11.6 MB
OR3/590 - Do We Have a Plan.mp4 8.6 MB
OR3/591 - What Is the Purpose of a BCP.mp4 11.8 MB
OR3/592 - More Reasons to Have Plans in Place.mp4 5.6 MB
OR3/593 - BCP Is a Core Component of Every Security Program.mp4 1.9 MB
OR3/594 - Steps of BCP Process.mp4 4.4 MB
OR3/595 - Different BCP Model.mp4 5.6 MB
OR3/596 - Documentation.mp4 3.5 MB
OR3/597 - BCP Policy Outlines.mp4 6.5 MB
OR3/598 - Who Is In Charge and Who Can We Blame.mp4 9 MB
OR3/599 - What’s Needed In a Team.mp4 4.2 MB
OR3/600 - BCP Development Team.mp4 3.5 MB
OR3/601 - Project Sizing.mp4 8.3 MB
OR3/602 - Properly Determining Scope Is Important.mp4 4.2 MB
OR3/603 - BCP Risk Analysis Steps.mp4 5.8 MB
OR3/604 - BIA Steps.mp4 6.7 MB
OR3/605 - Information from Different Sources.mp4 2.6 MB
OR3/606 - Analysis.mp4 5.9 MB
OR3/607 - How to Identify the Most Critical Company Functions.mp4 12.9 MB
OR3/608 - Interdependencies.mp4 1.7 MB
OR3/609 - Well, Of Course an Organization Knows How It Works!.mp4 4.3 MB
OR3/610 - Business Silos.mp4 14.1 MB
OR3/611 - Maximum Tolerable Downtime.mp4 11.9 MB
OR3/612 - Range of Threats to Consider.mp4 13.6 MB
OR3/613 - Thinking Outside of the Box What If….mp4 4.3 MB
OR3/614 - Biological Threats.mp4 3.8 MB
OR3/615 - BIA Steps (Cont.).mp4 4.3 MB
OR3/616 - Potential Disasters.mp4 5.1 MB
OR3/617 - Risk Approach.mp4 6.5 MB
OR3/618 - What Have We Completed Up to Now.mp4 12.8 MB
OR3/619 - Recovery Strategies.mp4 6.1 MB
OR3/620 - Alternate Business Process Procedures.mp4 6.4 MB
OR3/621 - Business Process Reconstruction.mp4 4.3 MB
OR3/622 - Recovery Strategies.mp4 4.1 MB
OR3/623 - Facility Backups.mp4 9.4 MB
OR3/624 - Compatibility Issues with Offsite Facility.mp4 10 MB
OR3/625 - Tertiary Sites.mp4 2.2 MB
OR3/626 - Subscription Costs.mp4 11.4 MB
OR3/627 - Multiple Processing Centers.mp4 2.3 MB
OR3/628 - Choosing Site Location.mp4 4.6 MB
OR3/629 - Other Offsite Approaches.mp4 9.2 MB
OR3/630 - Security Does Not Stop.mp4 5.9 MB
OR3/631 - More Options.mp4 4.2 MB
OR3/632 - Rolling Hot Site.mp4 1.9 MB
OR3/633 - Recovery Strategies (Cont.).mp4 2.9 MB
OR3/634 - Supply and Technology Recovery.mp4 8.4 MB
OR3/635 - VoIP.mp4 2.3 MB
OR3/636 - Equipment Replacement.mp4 11.5 MB
OR3/637 - What Items Need to Be Considered.mp4 7.5 MB
OR3/638 - Priorities.mp4 3.1 MB
OR3/639 - Executive Succession Planning.mp4 7.5 MB
OR3/640 - Recovery Strategies (Cont.).mp4 8.2 MB
OR3/641 - Co-Location.mp4 1.8 MB
OR3/642 - Data Recovery.mp4 8.7 MB
OR3/643 - Backup Redundancy.mp4 3.1 MB
OR3/644 - Recovering Data.mp4 3.3 MB
OR3/645 - Automated Backup Technologies.mp4 4.6 MB
OR3/646 - Tape Vaulting.mp4 11.2 MB
OR3/647 - Clustering for Fault Tolerance.mp4 6.7 MB
OR3/648 - Disk or Database Shadowing.mp4 17.4 MB
OR3/649 - Cost and Recovery Times.mp4 8 MB
OR3/650 - Recovery Solutions.mp4 2 MB
OR3/651 - Preventative Measures.mp4 6.3 MB
OR3/652 - Reviewing Insurance.mp4 4.2 MB
OR3/653 - Results from the BIA.mp4 6.7 MB
OR3/654 - Basic Structure of BCP.mp4 10.5 MB
OR3/655 - External Groups.mp4 7.4 MB
OR3/656 - Activation Phase.mp4 26.4 MB
OR3/657 - Reconstitution Phase.mp4 7.3 MB
OR3/658 - Who Goes First.mp4 4.8 MB
OR3/659 - Disaster Hit — Now What.mp4 2.6 MB
OR3/660 - Termination of BCP.mp4 2.2 MB
OR3/661 - Life Cycle.mp4 8.5 MB
OR3/662 - Types of Tests to Choose From.mp4 9.1 MB
OR3/663 - Test Objectives.mp4 5.2 MB
OR3/664 - Training Requirements.mp4 9.8 MB
OR3/665 - What Is Success.mp4 1.9 MB
OR3/666 - Out of Date.mp4 4.8 MB
OR3/667 - Keeping It Current.mp4 3.8 MB
OR3/668 - Change Control.mp4 2 MB
OR3/669 - Resulting Plan Should Contain….mp4 6.2 MB
OR3/670 - Phases of the BCP.mp4 1.9 MB
OR3/671 - Domain 8 Review.mp4 15.3 MB
OR3/672 - Application Security.mp4 4 MB
OR3/673 - How Did We Get Here.mp4 2.6 MB
OR3/674 - Why Are We Not Improving at a Higher Rate.mp4 5.2 MB
OR3/675 - Usual Trend of Dealing with Security.mp4 4.4 MB
OR3/676 - Software Development Tools.mp4 7.1 MB
OR3/677 - Security Issues.mp4 4.4 MB
OR3/678 - Language Types.mp4 9.9 MB
OR3/679 - Turn Into Machine Code.mp4 2.5 MB
OR3/680 - New and Old.mp4 1.8 MB
OR3/681 - Object-Oriented Programming.mp4 5.1 MB
OR3/682 - Classes and Objects.mp4 9.5 MB
OR3/683 - Functions and Messages.mp4 4 MB
OR3/684 - Object-Oriented Programming Characteristic.mp4 3.1 MB
OR3/685 - Polymorphism.mp4 6.1 MB
OR3/686 - Module Characteristics.mp4 4.3 MB
OR3/687 - Low Cohesion.mp4 3.2 MB
OR3/688 - Coupling.mp4 1.8 MB
OR3/689 - Agenda 2.mp4 4.8 MB
OR3/690 - Distributed Computing.mp4 3.2 MB
OR3/691 - Distributed Computing — ORBs.mp4 2.1 MB
OR3/692 - Common Object Request Broker Architecture.mp4 1.9 MB
OR3/693 - COM Architecture.mp4 6.5 MB
OR3/694 - Enterprise Java Beans.mp4 3.1 MB
OR3/695 - J2EE Platform Example.mp4 3 MB
OR3/696 - Linking Through COM.mp4 3.2 MB
OR3/697 - Mobile Code with Active Content.mp4 6.8 MB
OR3/698 - Java and Applets.mp4 9.1 MB
OR3/699 - Database Systems.mp4 6 MB
OR3/700 - Database Model.mp4 6.2 MB
OR3/701 - Object-Oriented Database.mp4 2.7 MB
OR3/702 - Benefits of OO Database Model.mp4 4.9 MB
OR3/703 - Database Models — Relational Components.mp4 10 MB
OR3/704 - Database Integrity.mp4 3.5 MB
OR3/705 - Different Modeling Approaches.mp4 2.1 MB
OR3/706 - Database Access Methods.mp4 17.2 MB
OR3/707 - Database Connectivity.mp4 3.4 MB
OR3/708 - Database Security Mechanisms.mp4 5.2 MB
OR3/709 - Rollback Control.mp4 2.1 MB
OR3/710 - Checkpoint Control.mp4 3.5 MB
OR3/711 - Checkpoint Protection.mp4 2.4 MB
OR3/712 - Lock Controls.mp4 3.4 MB
OR3/713 - Deadlock Example.mp4 2.8 MB
OR3/714 - Two-Phase Commit.mp4 1.4 MB
OR3/715 - Lock Controls Help to Provide ACID.mp4 7.2 MB
OR3/716 - Inference Attack.mp4 2.7 MB
OR3/717 - Database View Control.mp4 2 MB
OR3/718 - Common Components.mp4 1.3 MB
OR3/719 - Data Warehousing.mp4 13.5 MB
OR3/720 - Using a Data Warehouse.mp4 2.8 MB
OR3/721 - Metadata.mp4 571 KB
OR3/722 - Database Component.mp4 3.6 MB
OR3/723 - Data Mart.mp4 8 MB
OR3/724 - Potential Malicious Traffic Tunneling Through Port 80.mp4 3.4 MB
OR3/725 - OLTP.mp4 9 MB
OR3/726 - Knowledge Management.mp4 1.6 MB
OR3/727 - Knowledge Components.mp4 1.9 MB
OR3/728 - HR Example.mp4 2 MB
OR3/729 - Knowledge Discovery In Databases.mp4 4.4 MB
OR3/730 - Expert Systems.mp4 13.4 MB
OR3/731 - Software Development Models.mp4 8.7 MB
OR3/732 - Project Development — Phases I through V.mp4 2.3 MB
OR3/733 - Project Development — Phases VI and VII.mp4 2.5 MB
OR3/734 - Testing Types.mp4 6.7 MB
OR3/735 - Data Contamination Controls.mp4 4.3 MB
OR3/736 - Best Practices for Testing.mp4 5.5 MB
OR3/737 - Test for Specific Threats.mp4 6.5 MB
OR3/738 - Verification versus Validation.mp4 2.5 MB
OR3/739 - Evaluating the Resulting Product.mp4 3.1 MB
OR3/740 - Controlling How Changes Take Place.mp4 9.9 MB
OR3/741 - Administrative Controls.mp4 6.9 MB
OR3/742 - Common Information Flow.mp4 6.3 MB
OR3/743 - Tier Approach and Communication Components.mp4 2.1 MB
OR3/744 - Tiered Network Architectures.mp4 2 MB
OR3/745 - Sensitive Data Availability.mp4 22.3 MB
OR3/746 - Cookies.mp4 19.7 MB
OR3/747 - Find Out Where You Have Been.mp4 2.4 MB
OR3/748 - Pulling Data.mp4 3.7 MB
OR3/749 - Provide the Hackers with Tools.mp4 9.3 MB
OR3/750 - Common Web Server Flaws.mp4 2.4 MB
OR3/751 - Improper Data Validation.mp4 8.5 MB
OR3/752 - Uniform Resource Locator (URL).mp4 4.8 MB
OR3/753 - Directory Traversal.mp4 2.6 MB
OR3/754 - Buffer Overflow.mp4 2.7 MB
OR3/755 - Cross-Site Scripting Attack.mp4 4.3 MB
OR3/756 - Common SQL Injection Attack.mp4 4 MB
OR3/757 - Attacking Mis-configurations.mp4 2.9 MB
OR3/758 - CGI Information.mp4 6.5 MB
OR3/759 - Authentication.mp4 1.3 MB
OR3/760 - Protecting Traffic.mp4 25.2 MB
OR3/761 - Rolling ‘em Out.mp4 10.5 MB
OR3/762 - Virus.mp4 10.2 MB
OR3/763 - More Malware.mp4 4.9 MB
OR3/764 - Trojans.mp4 10.8 MB
OR3/765 - A Back Orifice Attack!.mp4 2.4 MB
OR3/766 - NetBus and Hoaxes.mp4 3.1 MB
OR3/767 - Malware Protection Types.mp4 1.7 MB
OR3/768 - Signature Scanning.mp4 3.5 MB
OR3/769 - Monitoring Activities.mp4 3.5 MB
OR3/770 - Monitoring for Changes.mp4 5.3 MB
OR3/771 - More Bad Stuff.mp4 4 MB
OR3/772 - Disclosing Data In an Unauthorized Manner.mp4 3.4 MB
OR3/773 - Covert Timing Channel.mp4 2.6 MB
OR3/774 - Circumventing Access Controls.mp4 5.4 MB
OR3/775 - Attacks.mp4 5.1 MB
OR3/776 - Attack Type — Race Condition.mp4 12.2 MB
OR3/777 - How a Buffer Overflow Works.mp4 2.8 MB
OR3/778 - Watching Network Traffic.mp4 3.7 MB
OR3/779 - Traffic Analysis.mp4 5.2 MB
OR3/780 - Functionally Two Different Types of Rootkits.mp4 2.6 MB
OR3/781 - Examples of Trojaned Files.mp4 1.5 MB
OR3/782 - Domain 9 Review.mp4 16.6 MB
OR3/783 - More Bad Stuff.mp4 4 MB
OR3/784 - Disclosing Data In an Unauthorized Manner.mp4 3.4 MB
OR3/785 - Covert Timing Channel.mp4 2.6 MB
OR3/786 - Circumventing Access Controls.mp4 5.4 MB
OR3/787 - Attacks.mp4 5.1 MB
OR3/788 - Attack Type — Race Condition.mp4 12.2 MB
OR3/789 - How a Buffer Overflow Works.mp4 2.8 MB
OR3/790 - Watching Network Traffic.mp4 3.7 MB
OR3/791 - Traffic Analysis.mp4 5.2 MB
OR3/792 - Functionally Two Different Types of Rootkits.mp4 2.6 MB
OR3/793 - Examples of Trojaned Files.mp4 1.5 MB
OR3/794 - Domain 9 Review.mp4 16.6 MB
OR3/795 - Operations Security.mp4 5.6 MB
OR3/796 - Computer Operations.mp4 7.9 MB
OR3/797 - Problem Management Procedures for Processing Problems.mp4 3.2 MB
OR3/798 - Higher Level Look.mp4 1.1 MB
OR3/799 - Administrative Controls Personnel Controls.mp4 10.6 MB
OR3/800 - Resource Protection.mp4 3.6 MB
OR3/801 - Media Labels and Controls.mp4 2.1 MB
OR3/802 - Software Escrow.mp4 2.6 MB
OR3/803 - Media Reuse.mp4 10.3 MB
OR3/804 - Why Not Just Delete the Files.mp4 5.4 MB
OR3/805 - Backups.mp4 2.7 MB
OR3/806 - Backup Types.mp4 2.2 MB
OR3/807 - Incremental Backup.mp4 3.3 MB
OR3/808 - Incremental.mp4 4.3 MB
OR3/809 - Differential Backup.mp4 5.9 MB
OR3/810 - Mean Time Between Failure.mp4 2.8 MB
OR3/811 - Mean Time to Repair.mp4 2.7 MB
OR3/812 - Redundant and Fault Tolerance.mp4 5.6 MB
OR3/813 - Mirroring Data.mp4 2 MB
OR3/814 - Direct Access Storage Device.mp4 16.9 MB
OR3/815 - Serial Advanced Technology Architecture.mp4 2.2 MB
OR3/816 - SAN.mp4 2.9 MB
OR3/817 - Fault Tolerance.mp4 3.8 MB
OR3/818 - Redundancy Mechanism.mp4 2.8 MB
OR3/819 - Some Threats to Computer Operations.mp4 2.1 MB
OR3/820 - Trusted Recovery of Software.mp4 3 MB
OR3/821 - After System Crash.mp4 2.2 MB
OR3/822 - Security Concerns.mp4 2.9 MB
OR3/823 - Contingency Planning.mp4 2.3 MB
OR3/824 - Remote Access Security.mp4 15.4 MB
OR3/825 - Before Carrying Out Vulnerability Testing.mp4 2 MB
OR3/826 - Testing for Vulnerabilities.mp4 2.2 MB
OR3/827 - Security Testing Issues.mp4 5.1 MB
OR3/828 - Vulnerability Scanning.mp4 3 MB
OR3/829 - Data Leakage — Keystroke Logging.mp4 2.5 MB
OR3/830 - Password Cracking.mp4 5.3 MB
OR3/831 - War Dialing.mp4 4.3 MB
OR3/832 - War Driving.mp4 6.5 MB
OR3/833 - Penetration Testing.mp4 20.8 MB
OR3/834 - Post-Testing and Assessment Steps.mp4 4.8 MB
OR3/835 - Penetration Testing Variations.mp4 2.3 MB
OR3/836 - Types of Testing.mp4 2.9 MB
OR3/837 - Protection Mechanism — Honeypot.mp4 3.8 MB
OR3/838 - Log Reviews.mov 1.6 MB
OR3/839 - Domain 10 Review.mp4 28.4 MB
OR3/840 - Course Closure.mp4 95.5 MB
OR3/Torrent_downloaded_from_Demonoid.is_.txt 58 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
OR3 Video 5.6 GB 3
OR3 Video 5.6 GB 3
OR3 15_17 4TT4CC0 4L TR3N0 Video 1.5 GB 8

Loading...