BITCQ

Security+

Size: 5.4 GB
Magnet link

Name Size
Security+/Cybrary_Security_Plus_Study_Guide.pdf 1.1 MB
Security+/Module 1/Security + Module 1.1 Part 01 - Firewalls-115784204.mp4 154.8 MB
Security+/Module 1/Security + Module 1.1 Part 02 - Proxies-115784206.mp4 80.5 MB
Security+/Module 1/Security + Module 1.1 Part 03 - Reverse Proxies-115784207.mp4 17.1 MB
Security+/Module 1/Security + Module 1.1 Part 04 - Network Address Translation-115784208.mp4 24.7 MB
Security+/Module 1/Security + Module 1.1 Part 05 - VPN Concentrators-115784210.mp4 19.5 MB
Security+/Module 1/Security + Module 1.2 - Network Administration Principles-115692759.mp4 125 MB
Security+/Module 1/Security + Module 1.3 Part 1 - Subnetting-115914596.mp4 99.6 MB
Security+/Module 1/Security + Module 1.3 Part 2 - Subnet Mask-115798495.mp4 31.6 MB
Security+/Module 1/Security + Module 1.3 Part 3 - Network Design Elements and Components-115692760.mp4 192.9 MB
Security+/Module 1/Security + Module 1.4 Part 1 - TCP.IP Internet Protocol-115822146.mp4 154.8 MB
Security+/Module 1/Security + Module 1.4 Part 2 - Common Protocols and Their Port Numbers-115822147.mp4 138.1 MB
Security+/Module 1/Security + Module 1.5 Part 1 - Security Related Issues - Wireless Network-115613627.mp4 145.3 MB
Security+/Module 1/Security + Module 1.5 Part 2 - Security Related Issues - Wireless Network-115787166.mp4 60.3 MB
Security+/Module 2/Security + Module 2.1 Part 1 - Risk Related Concepts-115611773.mp4 113.8 MB
Security+/Module 2/Security + Module 2.1 Part 2 - Risk Related Concepts-115611774.mp4 236.1 MB
Security+/Module 2/Security + Module 2.1 Part 3 - Control Types-115787637.mp4 29.4 MB
Security+/Module 2/Security + Module 2.1 Part 4 - The Principle of Least Privilege-115798131.mp4 18.8 MB
Security+/Module 2/Security + Module 2.2 Part 1 - Security Implications of Integrating Systems-115692761.mp4 72.3 MB
Security+/Module 2/Security + Module 2.2 Part 2 - Security Implications of Integrating Systems-115692762.mp4 62.2 MB
Security+/Module 2/Security + Module 2.3 - Appropriate Risk Mitigation Strategies-115692763.mp4 53.1 MB
Security+/Module 2/Security + Module 2.4 - Basic Forensic Procedures-115786674.mp4 87.4 MB
Security+/Module 2/Security + Module 2.5 - Incident Response Procedures-115693140.mp4 66.5 MB
Security+/Module 2/Security + Module 2.6 Part 1 - Importance of Security-115611775.mp4 106.9 MB
Security+/Module 2/Security + Module 2.6 Part 2 - Importance of Security Awareness and Training-115611776.mp4 143.5 MB
Security+/Module 2/Security + Module 2.7 - Physical Security and Environmental Controls-115914599.mp4 150.9 MB
Security+/Module 2/Security + Module 2.8 - Risk Management Best Practices-115612417.mp4 252.2 MB
Security+/Module 2/Security + Module 2.9 - Goals of Security-115612418.mp4 161.5 MB
Security+/Module 3/Security + Module 3.1 Part 1 - Types of Malware-115612419.mp4 176.4 MB
Security+/Module 3/Security + Module 3.1 Part 2 - Types of Malware-115825652.mp4 84.2 MB
Security+/Module 3/Security + Module 3.2 Part 1 - Phishing-115798130.mp4 142.5 MB
Security+/Module 3/Security + Module 3.2 Part 2 - Various Types of Attacks-115798132.mp4 84.4 MB
Security+/Module 3/Security + Module 3.3 - Social Engineering-115914600.mp4 56.8 MB
Security+/Module 3/Security + Module 3.4 - Types of Wireless Attacks-115798133.mp4 66 MB
Security+/Module 3/Security + Module 3.5 Part 1 - Application Attacks-115693141.mp4 41.1 MB
Security+/Module 3/Security + Module 3.5 Part 2 - Attacks (LDAP,XML) Injection-115693143.mp4 45 MB
Security+/Module 3/Security + Module 3.5 Part 3 - Zero Day Exploits, Cookies and Attachments-115693144.mp4 51 MB
Security+/Module 3/Security + Module 3.6 - Mitigation and Deterrent Techniques-115693145.mp4 98 MB
Security+/Module 3/Security + Module 3.7 Part 1 - Security Traits and Vulnerabilities-115708814.mp4 81.3 MB
Security+/Module 3/Security + Module 3.7 Part 2 - Asessment Techniques-115708815.mp4 45 MB
Security+/Module 3/Security + Module 3.8 Part 1 - Penetration Testing vs Vulnerability Scanning-115612420.mp4 49.1 MB
Security+/Module 3/Security + Module 3.8 Part 2 - Penetration Testing vs Vulnerability Scanning-115612422.mp4 44.4 MB
Security+/Module 4/Security + Module 4.1 - Applications, Security Controls and Techniques-115711625.mp4 105.5 MB
Security+/Module 4/Security + Module 4.2 Part 1 - Host Security-115798497.mp4 78.3 MB
Security+/Module 4/Security + Module 4.2 Part 2 - Hardware Security-115798498.mp4 77.7 MB
Security+/Module 4/Security + Module 4.2 Part 3 - Virtualization-115798673.mp4 41.5 MB
Security+/Module 4/Security + Module 4.3 - Importance of Data Security-115612966.mp4 96.9 MB
Security+/Module 4/Security + Module 4.4 Part 1 - Data Security-115784479.mp4 28.9 MB
Security+/Module 4/Security + Module 4.4 Part 2 - Data Encryption-115784482.mp4 75.6 MB
Security+/Module 4/Security + Module 4.4 Part 3 - Data Policies-115784483.mp4 39.1 MB
Security+/Module 5/Security + Module 5.1 - Authentication Services-115661412.mp4 44.5 MB
Security+/Module 5/Security + Module 5.2 Part 1 - Access Controls-115914603.mp4 72.5 MB
Security+/Module 5/Security + Module 5.2 Part 2 - Authentication Authorization and Access Control-115661413.mp4 96.2 MB
Security+/Module 5/Security + Module 5.2 Part 3 - Authentication Authorization and Access Control-115661415.mp4 131.2 MB
Security+/Module 5/Security + Module 5.2 Part 4 - Authentication Factors-115914605.mp4 55.2 MB
Security+/Module 5/Security + Module 5.3 Part 1 - Implementing Appropriate Security Controls When Performing Account Management-115661416.mp4 115.3 MB
Security+/Module 5/Security + Module 5.3 Part 2 - Best Practices For Account Management-115798134.mp4 138 MB
Security+/Module 6/Security + Exam Module - Exam Overivew-115798496.mp4 39.5 MB
Security+/Module 6/Security + Module 6.1 Part 1 - General Cryptography Concepts-115661418.mp4 53.9 MB
Security+/Module 6/Security + Module 6.1 Part 2 - Block Cyphers & Stream Cyphers-115662680.mp4 20.7 MB
Security+/Module 6/Security + Module 6.1 Part 3 - Transport Encryption-115662681.mp4 23.4 MB
Security+/Module 6/Security + Module 6.1 Part 4 - Hashing & Steganography-115662682.mp4 109.1 MB
Security+/Module 6/Security + Module 6.2 Part 1 - WEP, WPA and WPA2-115784632.mp4 33.1 MB
Security+/Module 6/Security + Module 6.2 Part 2 - MD5, SHA and AES-115784634.mp4 39.4 MB
Security+/Module 6/Security + Module 6.2 Part 3 - DES, HMAC and CHAP-115784633.mp4 80.3 MB
Security+/Module 6/Security + Module 6.3 - 6.4 - Public Key Infrastructure-115798760.mp4 46.1 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Avast Premium Security 26.1.10738 Application 784.6 MB 37
www.UIndex.org - Mom S05E08 An Epi-pen and a Security Cat 1080p AMZN WEB-DL DDP5 1 H 264-NTb Video 1.8 GB 35
[ WebToolTip.com ] Status of Security in Computing Application 3.6 MB 11
Cisco Software-Defined Access Networking (Secure Enterprise).epub Ebook 28.8 MB 10
[ DevCourseWeb.com ] Lynda - CISSP Cert Prep (2021) - 4 Communication and Network Security.zip Application 814.1 MB 9
Dunkerley M., Tumbarello M. - Mastering Windows Security and Hardening - Second Edition - 2022.epub Ebook 44.2 MB 9
[ WebToolTip.com ] Security for CompTIA A + Core 2 (220-1202) Video 847.7 MB 8
Windows 10 (1809) Enterprise LTSC (en-US) 177763.8276 (x64) - Security updates till 2029 Application 4.8 GB 8
Linkedin - Complete Guide to Open Source Security Video 924.7 MB 7
Matic L. - Electronic Security and Espionage A Handbook on DIY - 2021.pdf Application 22.1 MB 6
[ WebToolTip.com ] AWS Certified Security - Specialty (SCS-C02) - Infrastructure Security Video 485 MB 4
[ FreeCourseWeb.com ] International Security Management - New Solutions To Complexity by Gabriele Jacobs, Ilona Suojanen, Kate Horton, Saskia Bayerl Application 6.6 MB 4
Jahankhani H. Cyber Security Practitioner's Guide 2020 Application 32.5 MB 4
Chen Y. Network Security Empowered by Articial Intelligence 2024 Application 16.8 MB 2
[ CourseWikia.com ] Introduction to AWS Security (2023) Video 2.6 GB 2
Five Nights at Freddy's - Security Breach [FitGirl Repack] Application 29.8 GB 191
ESET Endpoint Antivirus _ ESET Endpoint Security 12.0.2045.0 RePack by KpoJIuK Application 66.6 MB 124
ESET Endpoint Antivirus _ ESET Endpoint Security 12.1.2057.3 RePack by KpoJIuK Application 43.8 MB 87
Hack to Secure A Practical Guide to Offensive Cybersecurity Ebook 1.3 MB 84
Dr.Web Security Space 12 Application 481.4 MB 62

Loading...