Parent directory/ | - | - |
subs/ | - | 2021-Sep-15 11:42 |
00001 GIAC_Security_Essentials_GSEC_-_Introduction.mp4 | 44.2 MiB | 2000-Nov-19 09:52 |
00002 Module_introduction.mp4 | 22.8 MiB | 2000-Nov-19 09:52 |
00003 Learning_objectives.mp4 | 16.3 MiB | 2000-Nov-19 09:52 |
00004 1.1_Network_Protocols_and_Reference_Models.mp4 | 169.7 MiB | 2000-Nov-19 09:52 |
00005 1.2_IPv4_vs._IPv6_and_ICMP_vs._ICMPv6.mp4 | 346.2 MiB | 2000-Nov-19 09:52 |
00006 1.3_Layer_4_Protocols.mp4 | 401.3 MiB | 2000-Nov-19 09:52 |
00007 1.4_Setting_up_a_Lab_Environment.mp4 | 293.9 MiB | 2000-Nov-19 09:52 |
00008 1.5_Using_t*****dump_and_Wireshark.mp4 | 221.6 MiB | 2000-Nov-19 09:52 |
00009 Learning_objectives.mp4 | 13.9 MiB | 2000-Nov-19 09:52 |
00010 2.1_CIA_Triad_and_Parkerian_Hexad.mp4 | 90.0 MiB | 2000-Nov-19 09:52 |
00011 2.2_Categories_and_Types_of_Controls.mp4 | 136.2 MiB | 2000-Nov-19 09:52 |
00012 2.3_Understanding_the_Enterprise_Architecture.mp4 | 53.8 MiB | 2000-Nov-19 09:52 |
00013 2.4_Introduction_to_Threat_Enumeration.mp4 | 85.6 MiB | 2000-Nov-19 09:52 |
00014 Learning_objectives.mp4 | 10.3 MiB | 2000-Nov-19 09:52 |
00015 3.1_Access_Control_Concepts.mp4 | 487.7 MiB | 2000-Nov-19 09:52 |
00016 3.2_Password_Management.mp4 | 210.5 MiB | 2000-Nov-19 09:52 |
00017 3.3_Introduction_to_Password_Cracking.mp4 | 281.1 MiB | 2000-Nov-19 09:52 |
00018 Learning_objectives.mp4 | 18.9 MiB | 2000-Nov-19 09:52 |
00019 4.1_Network_Topologies_and_Zones.mp4 | 257.6 MiB | 2000-Nov-19 09:52 |
00020 4.2_Overview_of_Network_Devices_and_Hardening.mp4 | 447.0 MiB | 2000-Nov-19 09:52 |
00021 4.3_Survey_of_Security_Devices_and_Wireshark.mp4 | 425.2 MiB | 2000-Nov-19 09:52 |
00022 4.4_Configuring_Firewalls_at_Amazon_Web_Services.mp4 | 252.6 MiB | 2000-Nov-19 09:52 |
00023 4.5_Exploring_a_Palo_Alto_Networks_Next-Generation_Firewall.mp4 | 238.5 MiB | 2000-Nov-19 09:52 |
00024 4.6_Examining_a_Classic_IPS_Sensor_Device.mp4 | 180.6 MiB | 2000-Nov-19 09:52 |
00025 Learning_objectives.mp4 | 11.5 MiB | 2000-Nov-19 09:52 |
00026 5.1_Introducing_the_Center_for_Internet_Security_CIS.mp4 | 111.8 MiB | 2000-Nov-19 09:52 |
00027 5.2_Overview_of_CIS_Controls.mp4 | 185.6 MiB | 2000-Nov-19 09:52 |
00028 5.3_Samples_and_Case_Studies.mp4 | 173.2 MiB | 2000-Nov-19 09:52 |
00029 Learning_objectives.mp4 | 14.2 MiB | 2000-Nov-19 09:52 |
00030 6.1_The_Evolution_of_IEEE_802.11_Security.mp4 | 343.4 MiB | 2000-Nov-19 09:52 |
00031 6.2_WPA3_Security.mp4 | 112.1 MiB | 2000-Nov-19 09:52 |
00032 6.3_PAN_NFC_and_5G_Concepts.mp4 | 130.3 MiB | 2000-Nov-19 09:52 |
00033 6.4_The_Internet_of_Things_IoT.mp4 | 160.4 MiB | 2000-Nov-19 09:52 |
00034 Module_introduction.mp4 | 16.5 MiB | 2000-Nov-19 09:52 |
00035 Learning_objectives.mp4 | 10.9 MiB | 2000-Nov-19 09:52 |
00036 7.1_Common_Attack_Types.mp4 | 493.8 MiB | 2000-Nov-19 09:52 |
00037 7.2_CryptoMalware.mp4 | 272.8 MiB | 2000-Nov-19 09:52 |
00038 7.3_Defensive_Strategies.mp4 | 217.9 MiB | 2000-Nov-19 09:52 |
00039 Learning_objectives.mp4 | 11.9 MiB | 2000-Nov-19 09:52 |
00040 8.1_Defense_in_Depth_Overview_and_Strategies.mp4 | 155.3 MiB | 2000-Nov-19 09:52 |
00041 8.2_Core_Security_Strategies.mp4 | 43.9 MiB | 2000-Nov-19 09:52 |
00042 8.3_Defensible_Network_Architectures.mp4 | 84.0 MiB | 2000-Nov-19 09:52 |
00043 Learning_objectives.mp4 | 10.3 MiB | 2000-Nov-19 09:52 |
00044 9.1_Overview_of_Active_Defense.mp4 | 152.1 MiB | 2000-Nov-19 09:52 |
00045 9.2_Active_Defense_Techniques.mp4 | 109.7 MiB | 2000-Nov-19 09:52 |
00046 9.3_Active_Defense_Tools.mp4 | 244.8 MiB | 2000-Nov-19 09:52 |
00047 Learning_objectives.mp4 | 13.9 MiB | 2000-Nov-19 09:52 |
00048 10.1_Overview_of_Endpoint_Security.mp4 | 137.9 MiB | 2000-Nov-19 09:52 |
00049 10.2_Host-based_Intrusion_Detection.mp4 | 67.8 MiB | 2000-Nov-19 09:52 |
00050 10.3_Host-based_Intrusion_Prevention.mp4 | 83.2 MiB | 2000-Nov-19 09:52 |
00051 10.4_Next-generation_Endpoint_Security_Solutions.mp4 | 93.4 MiB | 2000-Nov-19 09:52 |
00052 Module_introduction.mp4 | 14.6 MiB | 2000-Nov-19 09:52 |
00053 Learning_objectives.mp4 | 12.3 MiB | 2000-Nov-19 09:52 |
00054 11.1_Overview_of_Logging.mp4 | 241.6 MiB | 2000-Nov-19 09:52 |
00055 11.2_Logging_System_Setup_and_Configuration.mp4 | 111.5 MiB | 2000-Nov-19 09:52 |
00056 11.3_Logging_Analysis_Fundamentals.mp4 | 127.3 MiB | 2000-Nov-19 09:52 |
00057 11.4_Core_SIEM_Activities.mp4 | 143.1 MiB | 2000-Nov-19 09:52 |
00058 Learning_objectives.mp4 | 13.7 MiB | 2000-Nov-19 09:52 |
00059 12.1_Overview_of_Vulnerability_Management.mp4 | 201.6 MiB | 2000-Nov-19 09:52 |
00060 12.2_Network_Scanning.mp4 | 271.2 MiB | 2000-Nov-19 09:52 |
00061 12.3_Using_Xenmap_and_Yersinia.mp4 | 249.4 MiB | 2000-Nov-19 09:52 |
00062 12.4_Penetration_Testing.mp4 | 371.7 MiB | 2000-Nov-19 09:52 |
00063 Learning_objectives.mp4 | 15.6 MiB | 2000-Nov-19 09:52 |
00064 13.1_Overview_of_Virtualization_and_VM_Security.mp4 | 168.9 MiB | 2000-Nov-19 09:52 |
00065 13.2_Cloud_Models_and_Value_Proposition.mp4 | 445.4 MiB | 2000-Nov-19 09:52 |
00066 13.3_Common_Attacks_Against_Cloud_Services.mp4 | 213.7 MiB | 2000-Nov-19 09:52 |
00067 13.4_Introduction_to_Microsoft_Azure_IAM.mp4 | 333.1 MiB | 2000-Nov-19 09:52 |
00068 Module_introduction.mp4 | 22.6 MiB | 2000-Nov-19 09:52 |
00069 Learning_objectives.mp4 | 13.2 MiB | 2000-Nov-19 09:52 |
00070 14.1_Overview_of_Cryptology_and_Cryptosystems.mp4 | 170.9 MiB | 2000-Nov-19 09:52 |
00071 14.2_Cryptographic_Hashing.mp4 | 204.1 MiB | 2000-Nov-19 09:52 |
00072 14.3_Symmetric_Key_Cryptography.mp4 | 104.9 MiB | 2000-Nov-19 09:52 |
00073 14.4_Asymmetric_Key_Cryptography.mp4 | 87.2 MiB | 2000-Nov-19 09:52 |
00074 Learning_objectives.mp4 | 11.8 MiB | 2000-Nov-19 09:52 |
00075 15.1_Digital_Signatures.mp4 | 127.2 MiB | 2000-Nov-19 09:52 |
00076 15.2_IPsec.mp4 | 371.5 MiB | 2000-Nov-19 09:52 |
00077 15.3_SSL_TLS.mp4 | 99.6 MiB | 2000-Nov-19 09:52 |
00078 15.4_Public_Key_Infrastructure.mp4 | 342.4 MiB | 2000-Nov-19 09:52 |
00079 Learning_objectives.mp4 | 14.5 MiB | 2000-Nov-19 09:52 |
00080 16.1_The_Importance_of_Written_Security_Policies.mp4 | 102.5 MiB | 2000-Nov-19 09:52 |
00081 16.2_Standards_Guidelines_and_Procedures.mp4 | 94.4 MiB | 2000-Nov-19 09:52 |
00082 16.3_Acceptable_Use_Policies.mp4 | 46.6 MiB | 2000-Nov-19 09:52 |
00083 16.4_Survey_of_Sample_Policies.mp4 | 264.6 MiB | 2000-Nov-19 09:52 |
00084 Learning_objectives.mp4 | 11.6 MiB | 2000-Nov-19 09:52 |
00085 17.1_Overview_of_Risk_Management.mp4 | 192.2 MiB | 2000-Nov-19 09:52 |
00086 17.2_Risk_Management_Best_Practices.mp4 | 228.5 MiB | 2000-Nov-19 09:52 |
00087 17.3_Threat_Assessment_Analysis_and_Reporting.mp4 | 381.8 MiB | 2000-Nov-19 09:52 |
00088 Learning_objectives.mp4 | 12.0 MiB | 2000-Nov-19 09:52 |
00089 18.1_Fundamentals_of_Incident_Handling.mp4 | 101.5 MiB | 2000-Nov-19 09:52 |
00090 18.2_Six_Step_Incident_Response_Process.mp4 | 199.2 MiB | 2000-Nov-19 09:52 |
00091 18.3_Conducting_a_Forensic_Investigation.mp4 | 358.9 MiB | 2000-Nov-19 09:52 |
00092 Learning_objectives.mp4 | 12.9 MiB | 2000-Nov-19 09:52 |
00093 19.1_Business_Continuity_Planning_B*****.mp4 | 166.0 MiB | 2000-Nov-19 09:52 |
00094 19.2_Business_Impact_Analysis_BIA.mp4 | 82.0 MiB | 2000-Nov-19 09:52 |
00095 19.3_Backups_and_Restoration.mp4 | 103.1 MiB | 2000-Nov-19 09:52 |
00096 19.4_Disaster_Recovery_Planning_DRP.mp4 | 231.2 MiB | 2000-Nov-19 09:52 |
00097 Module_introduction.mp4 | 15.7 MiB | 2000-Nov-19 09:52 |
00098 Learning_objectives.mp4 | 11.5 MiB | 2000-Nov-19 09:52 |
00099 20.1_Operating_Systems_and_Services.mp4 | 121.0 MiB | 2000-Nov-19 09:52 |
00100 20.2_Windows_Workgroups_vs._Domains.mp4 | 201.7 MiB | 2000-Nov-19 09:52 |
00101 20.3_Windows-as-a-Service.mp4 | 136.8 MiB | 2000-Nov-19 09:52 |
00102 Learning_objectives.mp4 | 12.4 MiB | 2000-Nov-19 09:52 |
00103 21.1_NTFS_and_Shared_Folder_Permissions.mp4 | 112.2 MiB | 2000-Nov-19 09:52 |
00104 21.2_Registry_Keys_and_REGEDIT.EXE.mp4 | 100.3 MiB | 2000-Nov-19 09:52 |
00105 21.3_Windows_Privileges.mp4 | 133.8 MiB | 2000-Nov-19 09:52 |
00106 21.4_Overview_of_BitLocker_Drive_Encryption.mp4 | 163.6 MiB | 2000-Nov-19 09:52 |
00107 Learning_objectives.mp4 | 13.6 MiB | 2000-Nov-19 09:52 |
00108 22.1_Security_Templates_and_SCA_Snap-in.mp4 | 133.7 MiB | 2000-Nov-19 09:52 |
00109 22.2_Understanding_Group_Policy_Objects.mp4 | 96.3 MiB | 2000-Nov-19 09:52 |
00110 22.3_Administrative_Users_AppLocker_and_User_Account_Control.mp4 | 116.3 MiB | 2000-Nov-19 09:52 |
00111 Learning_objectives.mp4 | 12.3 MiB | 2000-Nov-19 09:52 |
00112 23.1_Azure_and_High_Availability.mp4 | 216.2 MiB | 2000-Nov-19 09:52 |
00113 23.2_Configuring_Azure_VM_Attributes.mp4 | 189.0 MiB | 2000-Nov-19 09:52 |
00114 23.3_Microsoft_Azure_Active_Directory_MAAD.mp4 | 234.5 MiB | 2000-Nov-19 09:52 |
00115 Learning_objectives.mp4 | 10.5 MiB | 2000-Nov-19 09:52 |
00116 24.1_Windows_PowerShell.mp4 | 291.3 MiB | 2000-Nov-19 09:52 |
00117 24.2_Administrative_Tools_and_Utilities.mp4 | 275.7 MiB | 2000-Nov-19 09:52 |
00118 24.3_Windows_Auditing_and_Forensics.mp4 | 196.7 MiB | 2000-Nov-19 09:52 |
00119 Module_introduction.mp4 | 15.9 MiB | 2000-Nov-19 09:52 |
00120 Learning_objectives.mp4 | 13.8 MiB | 2000-Nov-19 09:52 |
00121 25.1_Comparing_Linux_Operating_Systems.mp4 | 199.4 MiB | 2000-Nov-19 09:52 |
00122 25.2_Mobile_Device_Security.mp4 | 89.6 MiB | 2000-Nov-19 09:52 |
00123 25.3_Linux_Shells_and_Kernels.mp4 | 177.6 MiB | 2000-Nov-19 09:52 |
00124 25.4_Linux_Permissions.mp4 | 258.4 MiB | 2000-Nov-19 09:52 |
00125 25.5_Linux_User_Accounts.mp4 | 242.0 MiB | 2000-Nov-19 09:52 |
00126 Learning_objectives.mp4 | 13.1 MiB | 2000-Nov-19 09:52 |
00127 26.1_Starting_Services_at_Boot_Time.mp4 | 221.3 MiB | 2000-Nov-19 09:52 |
00128 26.2_Configuration_Management_Tools.mp4 | 145.4 MiB | 2000-Nov-19 09:52 |
00129 26.3_Linux_Kernel_Security.mp4 | 194.1 MiB | 2000-Nov-19 09:52 |
00130 26.4_Linux_System_Enhancers.mp4 | 157.7 MiB | 2000-Nov-19 09:52 |
00131 Learning_objectives.mp4 | 12.0 MiB | 2000-Nov-19 09:52 |
00132 27.1_Configuring_and_Monitoring_Logs.mp4 | 193.2 MiB | 2000-Nov-19 09:52 |
00133 27.2_Leveraging_the_Auditd_tool.mp4 | 102.5 MiB | 2000-Nov-19 09:52 |
00134 27.3_Linux_Security_Utilities.mp4 | 185.5 MiB | 2000-Nov-19 09:52 |
00135 GIAC_Security_Essentials_GSEC_-_Summary.mp4 | 33.7 MiB | 2000-Nov-19 09:52 |