8. Windows Security/1. Windows Security - what you’ll learn.vtt 1.2 kB
11. Defence in Depth/15. Law #7.vtt 1.2 kB
4. Network administration/1. Introduction to Monitoring Transmitted Data.vtt 1.2 kB
1. IT Security Trends/9. Myths #3 - IT security is always a priority.vtt 1.2 kB
14. Application Security - Configuration and Management/1. Here’s what you’ll learn in this module.vtt 1.1 kB
11. Defence in Depth/18. Law #10.vtt 716 Bytes
[TGx]Downloaded from torrentgalaxy.org.txt 524 Bytes
19. BONUS section - get your coupon code here/3. Thank you for joining this training.html 374 Bytes
13. Application Security/12. Check your knowledge and get ready for the exam.html 153 Bytes
17. Prepare for the examination/1. Answer sample questions which you can find during the examination.html 152 Bytes
10. Risk Management/7. Attack Methodologies - notes for the examination.html 10 Bytes
11. Defence in Depth/8. The Defence in Depth Model - notes for the examination.html 10 Bytes
16. Public Key Infrastructure/10. Public Key Infrastructure - Trust but verify - notes for the examination.html 10 Bytes
13. Application Security/8. Application Attacks - notes for the examination.html 10 Bytes
12. Disaster Recovery/11. How to reduce losses - notes for the examination.html 10 Bytes
15. Cryptography/17. Symmetric and Asymmetric Ciphers - notes for the examination.html 10 Bytes
14. Application Security - Configuration and Management/10. How to protect users without interrupting their work - notes for the examination.html 10 Bytes
11. Defence in Depth/20. Immutable Laws of Security - notes for the examination.html 10 Bytes
16. Public Key Infrastructure/9. Threat Modelling and Classification - notes for the examination.html 10 Bytes
10. Risk Management/12. Risk Assessment - notes for the examination.html 10 Bytes
10. Risk Management/20. Social Engineering and Rogue Software - notes for the examination.html 10 Bytes
13. Application Security/11. Program Security Assessment - notes for the examination.html 10 Bytes