BITCQ

CBTN49

Size: 2.1 GB
Magnet link

Name Size
CBTN49/1 - Information Security: Security and Risk Management/1 - CIA Concepts.mp4 18.2 MB
CBTN49/1 - Information Security: Security and Risk Management/10 - DR, BC, and BIA.mp4 23.2 MB
CBTN49/1 - Information Security: Security and Risk Management/11 - Security Awareness Training.mp4 19.1 MB
CBTN49/1 - Information Security: Security and Risk Management/12 - Intellectual Property and Licensing.mp4 25.7 MB
CBTN49/1 - Information Security: Security and Risk Management/13 - Policy Life Cycle.mp4 24.5 MB
CBTN49/1 - Information Security: Security and Risk Management/14 - Threat Modeling.mp4 24.8 MB
CBTN49/1 - Information Security: Security and Risk Management/15 - Supply Chain Risk Management.mp4 22.4 MB
CBTN49/1 - Information Security: Security and Risk Management/2 - Cyber Crime Terms and Vocabulary.mp4 16.9 MB
CBTN49/1 - Information Security: Security and Risk Management/3 - 27000 Series Framework.mp4 23.7 MB
CBTN49/1 - Information Security: Security and Risk Management/4 - Due Care and Due Diligence.mp4 20.5 MB
CBTN49/1 - Information Security: Security and Risk Management/5 - Inside Threats and Ethics.mp4 21.6 MB
CBTN49/1 - Information Security: Security and Risk Management/6 - Policies Start with Senior Management.mp4 23 MB
CBTN49/1 - Information Security: Security and Risk Management/7 - Defining Risk.mp4 19 MB
CBTN49/1 - Information Security: Security and Risk Management/8 - Control Types.mp4 18.5 MB
CBTN49/1 - Information Security: Security and Risk Management/9 - Compliance Requirements.mp4 23.1 MB
CBTN49/2 - Information Security: Asset Security/1 - Classifying Assets and Information.mp4 31.9 MB
CBTN49/2 - Information Security: Asset Security/2 - Stewards and Custodians of Assets and Information .mp4 28.5 MB
CBTN49/2 - Information Security: Asset Security/3 - Protecting Privacy.mp4 18 MB
CBTN49/2 - Information Security: Asset Security/4 - Data Retention.mp4 16.5 MB
CBTN49/2 - Information Security: Asset Security/5 - Determining Security Controls.mp4 21.3 MB
CBTN49/2 - Information Security: Asset Security/6 - Data State and Resources for Security Control Frameworks.mp4 9.4 MB
CBTN49/2 - Information Security: Asset Security/7 - Information and Asset Handling Policies.mp4 30.8 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/1 - Designing with Security in Mind.mp4 24.2 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/10 - Symmetric Encryption Concepts.mp4 24.7 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/11 - Symmetric Keys and Algorithms.mp4 17.8 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/12 - Asymmetric Encryption Concepts.mp4 20.6 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/13 - Digital Signature Concepts.mp4 24.1 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/14 - Hashing for Integrity.mp4 19.1 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/15 - Asymmetrical Encryption with Email.mp4 23.4 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/16 - PKI and Revoking Certificates.mp4 18.2 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/17 - Power Considerations.mp4 15.8 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/2 - Security Model Fundamentals.mp4 28.5 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/3 - System Security Requirements.mp4 20.1 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/4 - Hardware and Firmware Security Capabilities .mp4 26.9 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/5 - Assessing Vulnerabilities .mp4 21.8 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/6 - Vulnerabilities in Web-Based Systems.mp4 21.4 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/7 - Vulnerabilities in Mobile Systems.mp4 19 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/8 - Vulnerabilities in Embedded Devices.mp4 26.3 MB
CBTN49/3 - Information Security: Security Architecture and Engineering/9 - Facility Design and Controls.mp4 26.2 MB
CBTN49/4 - Information Security: Communication and Network Security/1 - OSI and IP Models.mp4 25 MB
CBTN49/4 - Information Security: Communication and Network Security/2 - IP Networking.mp4 28.1 MB
CBTN49/4 - Information Security: Communication and Network Security/3 - Wi-Fi Security Considerations.mp4 32.9 MB
CBTN49/4 - Information Security: Communication and Network Security/4 - Network Component Security.mp4 29 MB
CBTN49/4 - Information Security: Communication and Network Security/5 - Virtualized Network Security Considerations.mp4 18.1 MB
CBTN49/4 - Information Security: Communication and Network Security/6 - Securing Communications Channels.mp4 32 MB
CBTN49/5 - Information Security: Identity and Access Management (IAM)/1 - Identity Management (IdM).mp4 30.5 MB
CBTN49/5 - Information Security: Identity and Access Management (IAM)/2 - AAA as Part of Our Controls.mp4 26.4 MB
CBTN49/5 - Information Security: Identity and Access Management (IAM)/3 - Centralized Authentication with RADIUS.mp4 27.7 MB
CBTN49/5 - Information Security: Identity and Access Management (IAM)/4 - Using LDAP with Directory Services.mp4 17.2 MB
CBTN49/5 - Information Security: Identity and Access Management (IAM)/5 - Multi-Factor Authentication Categories.mp4 13.8 MB
CBTN49/5 - Information Security: Identity and Access Management (IAM)/6 - Biometric Acceptance and Rejection Rates .mp4 20.6 MB
CBTN49/5 - Information Security: Identity and Access Management (IAM)/7 - Options for Biometric Authentication.mp4 20.5 MB
CBTN49/5 - Information Security: Identity and Access Management (IAM)/8 - DAC, MAC, and RBAC.mp4 26 MB
CBTN49/5 - Information Security: Identity and Access Management (IAM)/9 - IAM Provisioning Lifecycle.mp4 33.1 MB
CBTN49/6 - Information Security: Security Assessment and Testing/1 - Testing, Auditing, and Assessment Overview.mp4 25.5 MB
CBTN49/6 - Information Security: Security Assessment and Testing/2 - Penetration Testing.mp4 21.7 MB
CBTN49/6 - Information Security: Security Assessment and Testing/3 - Vulnerability Scans and Assessments.mp4 11.2 MB
CBTN49/6 - Information Security: Security Assessment and Testing/4 - Reviewing and Testing Code.mp4 25.8 MB
CBTN49/6 - Information Security: Security Assessment and Testing/5 - Security-Related Data Collection .mp4 27 MB
CBTN49/6 - Information Security: Security Assessment and Testing/6 - Continuous Monitoring.mp4 18 MB
CBTN49/7 - Information Security: Security Operations/1 - Supporting Investigations.mp4 13.5 MB
CBTN49/7 - Information Security: Security Operations/10 - Incident Response Overview.mp4 25.4 MB
CBTN49/7 - Information Security: Security Operations/11 - Phases of Incident Handling.mp4 12.6 MB
CBTN49/7 - Information Security: Security Operations/12 - Improving Security with Configuration Management.mp4 19.2 MB
CBTN49/7 - Information Security: Security Operations/13 - Patch Management.mp4 20.9 MB
CBTN49/7 - Information Security: Security Operations/14 - Change Management.mp4 41.9 MB
CBTN49/7 - Information Security: Security Operations/15 - Comparing IDS and IPS .mp4 17.1 MB
CBTN49/7 - Information Security: Security Operations/16 - IDS and IPS Detection Methods.mp4 18.2 MB
CBTN49/7 - Information Security: Security Operations/17 - Network vs Host-Based IDS and IPS.mp4 24.3 MB
CBTN49/7 - Information Security: Security Operations/18 - IDS and IPS Alarms.mp4 17.3 MB
CBTN49/7 - Information Security: Security Operations/19 - Traditional and Next-Generation Firewalls.mp4 17.5 MB
CBTN49/7 - Information Security: Security Operations/2 - Types of Evidence.mp4 17.3 MB
CBTN49/7 - Information Security: Security Operations/20 - Categorizing Vulnerabilities with CVSS.mp4 14.8 MB
CBTN49/7 - Information Security: Security Operations/21 - Calculating Vulnerability Scores.mp4 21.3 MB
CBTN49/7 - Information Security: Security Operations/22 - Honeypots.mp4 22.7 MB
CBTN49/7 - Information Security: Security Operations/23 - Fault Tolerance for Availability.mp4 18.7 MB
CBTN49/7 - Information Security: Security Operations/24 - DR and Alternate Sites.mp4 20.4 MB
CBTN49/7 - Information Security: Security Operations/25 - H_W and S_W Planning for DR.mp4 14.4 MB
CBTN49/7 - Information Security: Security Operations/26 - Directing and Communicating DR.mp4 24.8 MB
CBTN49/7 - Information Security: Security Operations/27 - Personnel Safety and Security .mp4 21.7 MB
CBTN49/7 - Information Security: Security Operations/3 - Chain of Custody.mp4 14.9 MB
CBTN49/7 - Information Security: Security Operations/4 - Forensics Process.mp4 13.3 MB
CBTN49/7 - Information Security: Security Operations/5 - Separation of Duties.mp4 19.9 MB
CBTN49/7 - Information Security: Security Operations/6 - Media Management.mp4 22.3 MB
CBTN49/7 - Information Security: Security Operations/7 - Backups.mp4 30.8 MB
CBTN49/7 - Information Security: Security Operations/8 - Logging with Separation of Duties.mp4 29.3 MB
CBTN49/7 - Information Security: Security Operations/9 - RAID Concepts.mp4 13.6 MB
CBTN49/8 - Information Security: Software Development Security/1 - Software Development Security.mp4 24.3 MB
CBTN49/8 - Information Security: Software Development Security/2 - Software Development Life Cycle (SDLC).mp4 27.8 MB
CBTN49/8 - Information Security: Software Development Security/3 - Change Management.mp4 18.5 MB
CBTN49/8 - Information Security: Software Development Security/4 - Software Capability Maturity Model (CMMI).mp4 23 MB
CBTN49/8 - Information Security: Software Development Security/5 - Programming Concepts.mp4 27.5 MB
CBTN49/8 - Information Security: Software Development Security/6 - Programming Methodology.mp4 31.6 MB
CBTN49/8 - Information Security: Software Development Security/7 - Common Software Vulnerabilities.mp4 33.2 MB
CBTN49/8 - Information Security: Software Development Security/8 - Web Software Vulnerabilities.mp4 34 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
CBTN49 Video 2.1 GB 5

Loading...