BITCQ

Security+

Size: 5.4 GB
Magnet link

Name Size
Security+/Cybrary_Security_Plus_Study_Guide.pdf 1.1 MB
Security+/Module 1/Security + Module 1.1 Part 01 - Firewalls-115784204.mp4 154.8 MB
Security+/Module 1/Security + Module 1.1 Part 02 - Proxies-115784206.mp4 80.5 MB
Security+/Module 1/Security + Module 1.1 Part 03 - Reverse Proxies-115784207.mp4 17.1 MB
Security+/Module 1/Security + Module 1.1 Part 04 - Network Address Translation-115784208.mp4 24.7 MB
Security+/Module 1/Security + Module 1.1 Part 05 - VPN Concentrators-115784210.mp4 19.5 MB
Security+/Module 1/Security + Module 1.2 - Network Administration Principles-115692759.mp4 125 MB
Security+/Module 1/Security + Module 1.3 Part 1 - Subnetting-115914596.mp4 99.6 MB
Security+/Module 1/Security + Module 1.3 Part 2 - Subnet Mask-115798495.mp4 31.6 MB
Security+/Module 1/Security + Module 1.3 Part 3 - Network Design Elements and Components-115692760.mp4 192.9 MB
Security+/Module 1/Security + Module 1.4 Part 1 - TCP.IP Internet Protocol-115822146.mp4 154.8 MB
Security+/Module 1/Security + Module 1.4 Part 2 - Common Protocols and Their Port Numbers-115822147.mp4 138.1 MB
Security+/Module 1/Security + Module 1.5 Part 1 - Security Related Issues - Wireless Network-115613627.mp4 145.3 MB
Security+/Module 1/Security + Module 1.5 Part 2 - Security Related Issues - Wireless Network-115787166.mp4 60.3 MB
Security+/Module 2/Security + Module 2.1 Part 1 - Risk Related Concepts-115611773.mp4 113.8 MB
Security+/Module 2/Security + Module 2.1 Part 2 - Risk Related Concepts-115611774.mp4 236.1 MB
Security+/Module 2/Security + Module 2.1 Part 3 - Control Types-115787637.mp4 29.4 MB
Security+/Module 2/Security + Module 2.1 Part 4 - The Principle of Least Privilege-115798131.mp4 18.8 MB
Security+/Module 2/Security + Module 2.2 Part 1 - Security Implications of Integrating Systems-115692761.mp4 72.3 MB
Security+/Module 2/Security + Module 2.2 Part 2 - Security Implications of Integrating Systems-115692762.mp4 62.2 MB
Security+/Module 2/Security + Module 2.3 - Appropriate Risk Mitigation Strategies-115692763.mp4 53.1 MB
Security+/Module 2/Security + Module 2.4 - Basic Forensic Procedures-115786674.mp4 87.4 MB
Security+/Module 2/Security + Module 2.5 - Incident Response Procedures-115693140.mp4 66.5 MB
Security+/Module 2/Security + Module 2.6 Part 1 - Importance of Security-115611775.mp4 106.9 MB
Security+/Module 2/Security + Module 2.6 Part 2 - Importance of Security Awareness and Training-115611776.mp4 143.5 MB
Security+/Module 2/Security + Module 2.7 - Physical Security and Environmental Controls-115914599.mp4 150.9 MB
Security+/Module 2/Security + Module 2.8 - Risk Management Best Practices-115612417.mp4 252.2 MB
Security+/Module 2/Security + Module 2.9 - Goals of Security-115612418.mp4 161.5 MB
Security+/Module 3/Security + Module 3.1 Part 1 - Types of Malware-115612419.mp4 176.4 MB
Security+/Module 3/Security + Module 3.1 Part 2 - Types of Malware-115825652.mp4 84.2 MB
Security+/Module 3/Security + Module 3.2 Part 1 - Phishing-115798130.mp4 142.5 MB
Security+/Module 3/Security + Module 3.2 Part 2 - Various Types of Attacks-115798132.mp4 84.4 MB
Security+/Module 3/Security + Module 3.3 - Social Engineering-115914600.mp4 56.8 MB
Security+/Module 3/Security + Module 3.4 - Types of Wireless Attacks-115798133.mp4 66 MB
Security+/Module 3/Security + Module 3.5 Part 1 - Application Attacks-115693141.mp4 41.1 MB
Security+/Module 3/Security + Module 3.5 Part 2 - Attacks (LDAP,XML) Injection-115693143.mp4 45 MB
Security+/Module 3/Security + Module 3.5 Part 3 - Zero Day Exploits, Cookies and Attachments-115693144.mp4 51 MB
Security+/Module 3/Security + Module 3.6 - Mitigation and Deterrent Techniques-115693145.mp4 98 MB
Security+/Module 3/Security + Module 3.7 Part 1 - Security Traits and Vulnerabilities-115708814.mp4 81.3 MB
Security+/Module 3/Security + Module 3.7 Part 2 - Asessment Techniques-115708815.mp4 45 MB
Security+/Module 3/Security + Module 3.8 Part 1 - Penetration Testing vs Vulnerability Scanning-115612420.mp4 49.1 MB
Security+/Module 3/Security + Module 3.8 Part 2 - Penetration Testing vs Vulnerability Scanning-115612422.mp4 44.4 MB
Security+/Module 4/Security + Module 4.1 - Applications, Security Controls and Techniques-115711625.mp4 105.5 MB
Security+/Module 4/Security + Module 4.2 Part 1 - Host Security-115798497.mp4 78.3 MB
Security+/Module 4/Security + Module 4.2 Part 2 - Hardware Security-115798498.mp4 77.7 MB
Security+/Module 4/Security + Module 4.2 Part 3 - Virtualization-115798673.mp4 41.5 MB
Security+/Module 4/Security + Module 4.3 - Importance of Data Security-115612966.mp4 96.9 MB
Security+/Module 4/Security + Module 4.4 Part 1 - Data Security-115784479.mp4 28.9 MB
Security+/Module 4/Security + Module 4.4 Part 2 - Data Encryption-115784482.mp4 75.6 MB
Security+/Module 4/Security + Module 4.4 Part 3 - Data Policies-115784483.mp4 39.1 MB
Security+/Module 5/Security + Module 5.1 - Authentication Services-115661412.mp4 44.5 MB
Security+/Module 5/Security + Module 5.2 Part 1 - Access Controls-115914603.mp4 72.5 MB
Security+/Module 5/Security + Module 5.2 Part 2 - Authentication Authorization and Access Control-115661413.mp4 96.2 MB
Security+/Module 5/Security + Module 5.2 Part 3 - Authentication Authorization and Access Control-115661415.mp4 131.2 MB
Security+/Module 5/Security + Module 5.2 Part 4 - Authentication Factors-115914605.mp4 55.2 MB
Security+/Module 5/Security + Module 5.3 Part 1 - Implementing Appropriate Security Controls When Performing Account Management-115661416.mp4 115.3 MB
Security+/Module 5/Security + Module 5.3 Part 2 - Best Practices For Account Management-115798134.mp4 138 MB
Security+/Module 6/Security + Exam Module - Exam Overivew-115798496.mp4 39.5 MB
Security+/Module 6/Security + Module 6.1 Part 1 - General Cryptography Concepts-115661418.mp4 53.9 MB
Security+/Module 6/Security + Module 6.1 Part 2 - Block Cyphers & Stream Cyphers-115662680.mp4 20.7 MB
Security+/Module 6/Security + Module 6.1 Part 3 - Transport Encryption-115662681.mp4 23.4 MB
Security+/Module 6/Security + Module 6.1 Part 4 - Hashing & Steganography-115662682.mp4 109.1 MB
Security+/Module 6/Security + Module 6.2 Part 1 - WEP, WPA and WPA2-115784632.mp4 33.1 MB
Security+/Module 6/Security + Module 6.2 Part 2 - MD5, SHA and AES-115784634.mp4 39.4 MB
Security+/Module 6/Security + Module 6.2 Part 3 - DES, HMAC and CHAP-115784633.mp4 80.3 MB
Security+/Module 6/Security + Module 6.3 - 6.4 - Public Key Infrastructure-115798760.mp4 46.1 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Five Nights at Freddy's - Security Breach [FitGirl Repack] Application 29.8 GB 191
ESET Endpoint Antivirus _ ESET Endpoint Security 12.0.2045.0 RePack by KpoJIuK Application 66.6 MB 124
ESET Endpoint Antivirus _ ESET Endpoint Security 12.1.2057.3 RePack by KpoJIuK Application 43.8 MB 87
Hack to Secure A Practical Guide to Offensive Cybersecurity Ebook 1.3 MB 84
Dr.Web Security Space 12 Application 481.4 MB 62
Tang A. Safeguarding the Future. Security and Privacy by Design...2025 Application 4.5 MB 57
[computer-internet] Defensive Security Handbook_ Best Practices for Securing Infrastructure by Lee Brotherston PDF Application 8.8 MB 53
Walsh J. Identity Security for Software Development. Best Practices...2025 Application 6.7 MB 52
Parrot-security-6.0_amd64.iso Application 4.9 GB 50
Melon VPN - Secure Proxy VPN v8.1.136 [AppDoze] Application 31.6 MB 44
[FTUApps.com] - Avast Premium Security v25.6.6165a Build 25.6.10221.939 Multilingual Pre-Activated Application 768.7 MB 43
Kaspersky Endpoint Security 10 Application 262.1 MB 42
National Security (2003) [1080p] [BluRay] [5.1] [YTS.MX] Video 1.6 GB 41
Спилкэ Лауренциу - Spring Security в действии - 2025.pdf Application 13.7 MB 40
Avira Security Antivirus & VPN v7.27.0 [AppDoze] Application 33.7 MB 40
Zadeh N. Computer Security Fundamentals 2025 Application 17.3 MB 39
The Embedded Linux Security Handbook.pdf Application 25.7 MB 38
[FTUApps.com] - ESET Security Ultimate v18.1.10.0 Multilingual Pre-Activated Application 95.1 MB 37
Avast Premium Security 25.7.10308 Application 752.7 MB 36
Security Architecture A practical guide by Jeremy Green.epub Ebook 13.5 MB 34

Loading...