8. Windows Security/1. Windows Security - what you’ll learn.vtt 1.2 kB
11. Defence in Depth/15. Law #7.vtt 1.2 kB
4. Network administration/1. Introduction to Monitoring Transmitted Data.vtt 1.2 kB
14. Application Security - Configuration and Management/1. Here’s what you’ll learn in this module.srt 1.2 kB
1. IT Security Trends/9. Myths #3 - IT security is always a priority.vtt 1.2 kB
14. Application Security - Configuration and Management/1. Here’s what you’ll learn in this module.vtt 1.1 kB
11. Defence in Depth/18. Law #10.srt 796 Bytes
11. Defence in Depth/18. Law #10.vtt 716 Bytes
0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles & Community based Forum.url 377 Bytes
19. BONUS section - get your coupon code here/3. Thank you for joining the training.html 374 Bytes
0. Websites you may like/1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url 328 Bytes
0. Websites you may like/2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
0. Websites you may like/4. (FTUApps.com) Download Cracked Developers Applications For Free.url 239 Bytes
0. Websites you may like/How you can help Team-FTU.txt 237 Bytes
0. Websites you may like/3. (NulledPremium.com) Download E-Learning, E-Books, Audio-Books, Comics, Articles and more... etc.url 163 Bytes
13. Application Security/12. Check your knowledge and get ready for the exam.html 157 Bytes
17. Prepare for the examination/1. Answer sample questions which you can find during the examination.html 156 Bytes
10. Risk Management/12. Risk Assessment - notes for the examination.html 10 Bytes
10. Risk Management/20. Social Engineering and Rogue Software - notes for the examination.html 10 Bytes
10. Risk Management/7. Attack Methodologies - notes for the examination.html 10 Bytes
11. Defence in Depth/20. Immutable Laws of Security - notes for the examination.html 10 Bytes
11. Defence in Depth/8. The Defence in Depth Model - notes for the examination.html 10 Bytes
12. Disaster Recovery/11. How to reduce losses - notes for the examination.html 10 Bytes
13. Application Security/11. Program Security Assessment - notes for the examination.html 10 Bytes
13. Application Security/8. Application Attacks - notes for the examination.html 10 Bytes
14. Application Security - Configuration and Management/10. How to protect users without interrupting their work - notes for the examination.html 10 Bytes
15. Cryptography/17. Symmetric and Asymmetric Ciphers - notes for the examination.html 10 Bytes
16. Public Key Infrastructure/10. Public Key Infrastructure - Trust but verify - notes for the examination.html 10 Bytes
16. Public Key Infrastructure/9. Threat Modelling and Classification - notes for the examination.html 10 Bytes