BT种子基本信息
- 种子哈希:c5a54e32ee33c8c112a3ee2d6121231fe95d5133
- 文档大小:6.3 GB
- 文档个数:127个文档
- 下载次数:77次
- 下载速度:极快
- 收录时间:2021-11-29
- 最近下载:2024-05-04
- DMCA/屏蔽:DMCA/屏蔽
文档列表
6. Infrastructure Security/7. Social Engineering Attacks.mp4 287.8 MB
9. Application Architecture and Infrastructure/2. Cloud Models and Shared Responsibility model.mp4 241.1 MB
8. System Resilience/1. System Resilience Intro.mp4 234.7 MB
2. Cybersecurity Principles/5. How to measure risk (part II).mp4 219.9 MB
7. Logging and Monitoring/1. Logging and Monitoring.mp4 206.7 MB
6. Infrastructure Security/6. Malware.mp4 195.1 MB
2. Cybersecurity Principles/4. How to measure risk.mp4 184.6 MB
3. IAM - Identity an Access Management/3. Authorization and Permissions.mp4 181.2 MB
6. Infrastructure Security/2. Data Encryption.mp4 172.7 MB
4. Secure Protocols/2. Secure Protocols.mp4 166.6 MB
3. IAM - Identity an Access Management/1. IAM and IAA - Identity and Access Management.mp4 155.6 MB
9. Application Architecture and Infrastructure/10. Secure DevOps.mp4 146.1 MB
2. Cybersecurity Principles/2. The CIA of Cybersecurity.mp4 146.0 MB
3. IAM - Identity an Access Management/8. User Authentication Methods.mp4 139.4 MB
9. Application Architecture and Infrastructure/3. Application infrastructure.mp4 135.8 MB
5. Cryptography, Hashing and Digital Signatures/4. Hash functions characteristics.mp4 133.2 MB
3. IAM - Identity an Access Management/7. Password Security.mp4 130.2 MB
6. Infrastructure Security/3. Denial of Service.mp4 127.0 MB
9. Application Architecture and Infrastructure/7. Testing your application.mp4 126.5 MB
5. Cryptography, Hashing and Digital Signatures/7. Cryptography Methods.mp4 124.9 MB
5. Cryptography, Hashing and Digital Signatures/3. Hashing.mp4 122.6 MB
5. Cryptography, Hashing and Digital Signatures/6. Cryptography Basics.mp4 113.4 MB
3. IAM - Identity an Access Management/2. MFA - Multi Factor Authentication.mp4 112.1 MB
5. Cryptography, Hashing and Digital Signatures/2. Consensus Mechanisms.mp4 111.8 MB
4. Secure Protocols/3. Network Models.mp4 111.5 MB
2. Cybersecurity Principles/6. Governance and Procurement.mp4 110.9 MB
5. Cryptography, Hashing and Digital Signatures/8. Random numbers.mp4 108.3 MB
9. Application Architecture and Infrastructure/8. Testing your Infrastructure.mp4 106.0 MB
5. Cryptography, Hashing and Digital Signatures/11. ECDSA.mp4 103.2 MB
5. Cryptography, Hashing and Digital Signatures/12. Quantum Computing.mp4 101.1 MB
10. Incident Detection and Response/1. Incident Detection and Response.mp4 98.9 MB
6. Infrastructure Security/5. Attacking applications.mp4 97.8 MB
6. Infrastructure Security/4. Man-in-the-middle attack.mp4 96.7 MB
3. IAM - Identity an Access Management/6. Least Privilege and Segregation of Duties.mp4 92.6 MB
5. Cryptography, Hashing and Digital Signatures/9. Prime numbers.mp4 91.8 MB
5. Cryptography, Hashing and Digital Signatures/10. RSA.mp4 90.0 MB
4. Secure Protocols/6. Application protocols.mp4 83.6 MB
8. System Resilience/2. Infrastructure hardening.mp4 80.2 MB
9. Application Architecture and Infrastructure/5. NACLs.mp4 80.1 MB
9. Application Architecture and Infrastructure/11. Secure Development and Deployment.mp4 75.7 MB
10. Incident Detection and Response/2. Contingency Planning.mp4 73.3 MB
1. Cyber Security Masterclass - Course Intro/1. Course Introduction.mp4 72.9 MB
9. Application Architecture and Infrastructure/9. Other security practices.mp4 72.6 MB
4. Secure Protocols/4. TLS.mp4 61.7 MB
3. IAM - Identity an Access Management/5. ALCs.mp4 59.7 MB
4. Secure Protocols/5. IP Models.mp4 50.2 MB
2. Cybersecurity Principles/3. Non-repudiation.mp4 47.7 MB
3. IAM - Identity an Access Management/4. Permissioned and Permissionless.mp4 47.3 MB
4. Secure Protocols/1. Secure Protocols Intro.mp4 45.7 MB
5. Cryptography, Hashing and Digital Signatures/1. Cryptography, Hashing and Digital Signatures Intro.mp4 42.5 MB
9. Application Architecture and Infrastructure/1. Application Architecture and Infrastructure.mp4 40.7 MB
9. Application Architecture and Infrastructure/6. Network Firewalls.mp4 36.8 MB
9. Application Architecture and Infrastructure/4. VPCs.mp4 36.6 MB
1. Cyber Security Masterclass - Course Intro/2. Course housekeeping.mp4 33.3 MB
6. Infrastructure Security/1. Infrastructure Security Intro.mp4 31.1 MB
5. Cryptography, Hashing and Digital Signatures/5. Digital Signatures.mp4 27.5 MB
2. Cybersecurity Principles/1. Cybersecurity Principles Intro.mp4 22.8 MB
11. Conclusion/1. Congratulations and next steps.mp4 16.5 MB
9. Application Architecture and Infrastructure/2. Cloud Models and Shared Responsibility model.srt 19.1 kB
6. Infrastructure Security/7. Social Engineering Attacks.srt 18.2 kB
7. Logging and Monitoring/1. Logging and Monitoring.srt 14.5 kB
4. Secure Protocols/2. Secure Protocols.srt 14.0 kB
6. Infrastructure Security/2. Data Encryption.srt 13.7 kB
8. System Resilience/1. System Resilience Intro.srt 13.2 kB
9. Application Architecture and Infrastructure/3. Application infrastructure.srt 12.8 kB
6. Infrastructure Security/6. Malware.srt 12.4 kB
3. IAM - Identity an Access Management/3. Authorization and Permissions.srt 12.4 kB
4. Secure Protocols/6. Application protocols.srt 12.3 kB
2. Cybersecurity Principles/5. How to measure risk (part II).srt 12.1 kB
5. Cryptography, Hashing and Digital Signatures/4. Hash functions characteristics.srt 11.8 kB
9. Application Architecture and Infrastructure/7. Testing your application.srt 11.4 kB
2. Cybersecurity Principles/4. How to measure risk.srt 11.2 kB
4. Secure Protocols/3. Network Models.srt 11.2 kB
2. Cybersecurity Principles/2. The CIA of Cybersecurity.srt 11.0 kB
9. Application Architecture and Infrastructure/10. Secure DevOps.srt 10.7 kB
6. Infrastructure Security/3. Denial of Service.srt 10.5 kB
9. Application Architecture and Infrastructure/5. NACLs.srt 10.4 kB
5. Cryptography, Hashing and Digital Signatures/10. RSA.srt 10.1 kB
5. Cryptography, Hashing and Digital Signatures/3. Hashing.srt 10.0 kB
6. Infrastructure Security/5. Attacking applications.srt 10.0 kB
6. Infrastructure Security/4. Man-in-the-middle attack.srt 9.9 kB
3. IAM - Identity an Access Management/1. IAM and IAA - Identity and Access Management.srt 9.8 kB
5. Cryptography, Hashing and Digital Signatures/8. Random numbers.srt 9.6 kB
3. IAM - Identity an Access Management/8. User Authentication Methods.srt 9.6 kB
5. Cryptography, Hashing and Digital Signatures/2. Consensus Mechanisms.srt 9.5 kB
9. Application Architecture and Infrastructure/8. Testing your Infrastructure.srt 9.0 kB
10. Incident Detection and Response/1. Incident Detection and Response.srt 8.6 kB
3. IAM - Identity an Access Management/7. Password Security.srt 8.2 kB
2. Cybersecurity Principles/6. Governance and Procurement.srt 8.0 kB
5. Cryptography, Hashing and Digital Signatures/9. Prime numbers.srt 7.9 kB
5. Cryptography, Hashing and Digital Signatures/6. Cryptography Basics.srt 7.8 kB
9. Application Architecture and Infrastructure/11. Secure Development and Deployment.srt 7.4 kB
5. Cryptography, Hashing and Digital Signatures/11. ECDSA.srt 7.3 kB
9. Application Architecture and Infrastructure/9. Other security practices.srt 6.9 kB
5. Cryptography, Hashing and Digital Signatures/7. Cryptography Methods.srt 6.9 kB
download.jpg 6.3 kB
3. IAM - Identity an Access Management/2. MFA - Multi Factor Authentication.srt 6.1 kB
5. Cryptography, Hashing and Digital Signatures/12. Quantum Computing.srt 5.7 kB
4. Secure Protocols/4. TLS.srt 5.3 kB
3. IAM - Identity an Access Management/6. Least Privilege and Segregation of Duties.srt 5.3 kB
10. Incident Detection and Response/2. Contingency Planning.srt 4.7 kB
4. Secure Protocols/5. IP Models.srt 4.6 kB
8. System Resilience/2. Infrastructure hardening.srt 4.3 kB
1. Cyber Security Masterclass - Course Intro/1. Course Introduction.srt 3.9 kB
9. Application Architecture and Infrastructure/4. VPCs.srt 3.5 kB
3. IAM - Identity an Access Management/5. ALCs.srt 3.0 kB
3. IAM - Identity an Access Management/4. Permissioned and Permissionless.srt 2.9 kB
2. Cybersecurity Principles/3. Non-repudiation.srt 2.8 kB
9. Application Architecture and Infrastructure/6. Network Firewalls.srt 2.8 kB
9. Application Architecture and Infrastructure/1. Application Architecture and Infrastructure.srt 2.7 kB
5. Cryptography, Hashing and Digital Signatures/1. Cryptography, Hashing and Digital Signatures Intro.srt 2.5 kB
5. Cryptography, Hashing and Digital Signatures/5. Digital Signatures.srt 2.4 kB
4. Secure Protocols/1. Secure Protocols Intro.srt 2.3 kB
1. Cyber Security Masterclass - Course Intro/2. Course housekeeping.srt 2.2 kB
6. Infrastructure Security/1. Infrastructure Security Intro.srt 1.9 kB
2. Cybersecurity Principles/1. Cybersecurity Principles Intro.srt 1.4 kB
11. Conclusion/1. Congratulations and next steps.srt 990 Bytes
11. Conclusion/2. Bonus and thank you note.html 499 Bytes
10. Incident Detection and Response/3. Incident Detection and Response Quiz.html 203 Bytes
2. Cybersecurity Principles/7. Cybersecurity Principles Quiz.html 203 Bytes
3. IAM - Identity an Access Management/9. IAM Quiz.html 203 Bytes
4. Secure Protocols/7. Secure protocols quiz.html 203 Bytes
5. Cryptography, Hashing and Digital Signatures/13. Cryptography, Hashing and Digital Signatures.html 203 Bytes
6. Infrastructure Security/8. Infrastructure Security quiz.html 203 Bytes
7. Logging and Monitoring/2. Logging and Monitoring Quiz.html 203 Bytes
8. System Resilience/3. System Resilience quiz.html 203 Bytes
9. Application Architecture and Infrastructure/12. Application Architecture and Infrastructure.html 203 Bytes
==查看完整文档列表==