transfer.cizgitagem.org - /nsaral/tagem_new/Messers_Security/


[To Parent Directory]

6/15/2017 5:17 PM 14059892 2.8.mp4
6/15/2017 5:17 PM 6012672 Access Control Lists - 1.2.mp4
6/15/2017 5:17 PM 14322288 Account Policy Enforcement - 5.3.mp4
6/15/2017 5:17 PM 7072898 All-in-one Appliances and Spam Filters - 1.1.mp4
6/15/2017 5:17 PM 17864008 An Overview of Adware and Spyware - 3.1.mp4
6/15/2017 5:16 PM 10836200 An Overview of Botnets - 3.1.mp4
6/15/2017 5:17 PM 15825433 An Overview of Rootkits - 3.1.mp4
6/15/2017 5:17 PM 14626924 An Overview of Spam - 3.2.mp4
6/15/2017 5:17 PM 30312076 Anti-Malware Best Practices - 4.2.mp4
6/15/2017 5:16 PM 11331324 Application Configuration Baselining and Hardening - 4.1.mp4
6/15/2017 5:16 PM 15129999 Application Patch Management - 4.1.mp4
6/15/2017 5:16 PM 16145114 Assessment Techniques - 3.7.mp4
6/15/2017 5:16 PM 20189309 Assessment Tools - 3.7.mp4
6/15/2017 5:16 PM 24176174 Assessment Types - 3.7.mp4
6/15/2017 5:16 PM 43145084 Asymmetric Encryption with PGP and GPG - 6.2.mp4
6/15/2017 5:16 PM 11475213 Authorization and Access Control - 5.2.mp4
6/15/2017 5:16 PM 35954312 Backups - 2.7.mp4
6/15/2017 5:16 PM 9699642 Block and Stream Ciphers - 6.1.mp4
6/15/2017 5:16 PM 15802018 Bluejacking and Bluesnarfing - 3.4.mp4
6/15/2017 5:16 PM 7827412 Business Impact Analysis - 2.5.mp4
6/15/2017 5:16 PM 15482026 Certificate Authorities - 6.3.mp4
6/15/2017 5:16 PM 8533222 Chain of Custody and First Responders - 2.3.mp4
6/15/2017 5:16 PM 9681043 Change Management - 2.2.mp4
6/15/2017 5:16 PM 16908863 Cloud Computing - 1.3.mp4
6/15/2017 5:16 PM 7151541 Cloud Computing Risks - 2.1.mp4
6/15/2017 5:16 PM 7592068 Cold Site Hot Site and Warm Site - 2.7.mp4
6/15/2017 5:16 PM 11102997 Common Network Ports - 1.5.mp4
6/15/2017 5:16 PM 11903573 Compliance Best Practices and Standards - 2.4.mp4
6/15/2017 5:16 PM 11949456 Control Types - 2.1.mp4
6/15/2017 5:16 PM 30864815 Cookies Header Manipulation and Session Hijacking - 3.5.mp4
6/15/2017 5:16 PM 34535555 Cross-site Scripting - 3.5.mp4
6/15/2017 5:16 PM 23835054 Cryptographic Hash Functions - 6.2.mp4
6/15/2017 5:16 PM 24527240 Cryptography Overview - 6.1.mp4
6/15/2017 5:16 PM 8595001 Data Labeling Handling and Disposal - 2.4.mp4
6/15/2017 5:16 PM 6305344 Data Loss and Theft Policies - 2.2.mp4
6/15/2017 5:16 PM 15032319 Detection Controls vs. Prevention Controls - 3.6.mp4
6/15/2017 5:16 PM 9659030 Digital Certificates - 6.3.mp4
6/15/2017 5:16 PM 9964974 Disaster Recovery and Succession Planning - 2.5.mp4
6/15/2017 5:16 PM 6595938 DMZ Overview - 1.3.mp4
6/15/2017 5:16 PM 10375182 Dumpster Diving - 3.3.mp4
6/15/2017 5:16 PM 6767693 EAP PEAP and LEAP - 1.6.mp4
6/15/2017 5:16 PM 7596123 Elliptic Curve and Quantum Cryptography - 6.1.mp4
6/15/2017 5:16 PM 11498196 Environmental Monitoring EMI Shielding and Video Monitoring - 2.6.mp4
6/15/2017 5:16 PM 9741623 Expenses and Damage Control - 2.3.mp4
6/15/2017 5:16 PM 9456556 False Positives - 2.1.mp4
6/15/2017 5:16 PM 7024442 Fire Suppression - 2.6.mp4
6/15/2017 5:16 PM 21972861 Firewall Rules - 1.2.mp4
6/15/2017 5:16 PM 11100108 Flood Guards - 1.2.mp4
6/15/2017 5:16 PM 12855064 Hardware Security - 4.2.mp4
6/15/2017 5:16 PM 15996162 Hashing - 6.1.mp4
6/15/2017 5:16 PM 13674739 Hoaxes - 3.3.mp4
6/15/2017 5:16 PM 4921839 Hot and Cold Aisles - 2.6.mp4
6/15/2017 5:16 PM 7279754 HTTPS and TLS SSL - 1.4.mp4
6/15/2017 5:16 PM 10960591 HVAC and Temperature Humidity - 2.6.mp4
6/15/2017 5:16 PM 13785343 ICMP and SNMP - 1.4.mp4
6/15/2017 5:16 PM 10667086 Impersonation - 3.3.mp4
6/15/2017 5:16 PM 9190836 Implementing Certificate Authorities - 6.4.mp4
6/15/2017 5:16 PM 8923352 Implementing Digital Certificates - 6.4.mp4
6/15/2017 5:16 PM 7157771 Implementing Key Recovery - 6.4.mp4
6/15/2017 5:16 PM 6826130 Implementing Key Revocation - 6.4.mp4
6/15/2017 5:16 PM 9609193 Implementing PKI - 6.4.mp4
6/15/2017 5:16 PM 32593559 Implementing Public and Private Keys - 6.4.mp4
6/15/2017 5:16 PM 10188983 Incident Management - 2.2.mp4
6/15/2017 5:16 PM 20053191 Initialization Vector Attacks - 3.4.mp4
6/15/2017 5:16 PM 15115168 Introduction ot IPv4 and IPv6 - 1.4.mp4
6/15/2017 5:16 PM 9955605 IT Contingency Planning - 2.5.mp4
6/15/2017 5:16 PM 7779035 Key Escrow - 6.1.mp4
6/15/2017 5:16 PM 7798390 Key Escrow - 6.3.mp4
6/15/2017 5:16 PM 8479204 Key Recovery - 6.3.mp4
6/15/2017 5:16 PM 7199610 Key Registration - 6.3.mp4
6/15/2017 5:16 PM 8400892 Key Revocation - 6.3.mp4
6/15/2017 5:16 PM 7672011 Log Analysis - 1.2.mp4
6/15/2017 5:16 PM 9673493 MAC Filtering and SSID Management - 1.6.mp4
6/15/2017 5:16 PM 19241696 Malicious Add-ons and Email Attachments - 3.5.mp4
6/15/2017 5:16 PM 23814856 Malware Overview - 3.1.mp4
6/15/2017 5:16 PM 9221765 Mitigating Multiple Account Issues - 5.3.mp4
6/15/2017 5:16 PM 16876056 Mobile Device Security - 4.2.mp4
6/15/2017 5:16 PM 20363653 Monitoring System Logs - 3.6.mp4
6/15/2017 5:16 PM 9082848 Multi-Factor Authentication - 5.2.mp4
6/15/2017 5:16 PM 5997790 Network Access Control - 1.3.mp4
6/15/2017 5:16 PM 16565092 Network Intrusion Detection and Prevention - 1.1.mp4
6/15/2017 5:16 PM 8797667 Network Separation - 1.2.mp4
6/15/2017 5:16 PM 7772972 Network Traffic - 2.3.mp4
6/15/2017 5:16 PM 16590904 Non-repudiation - 6.1.mp4
6/15/2017 5:16 PM 13560278 One-Time Pads - 6.2.mp4
6/15/2017 5:16 PM 24721879 Operating System Hardening - 3.6.mp4
6/15/2017 5:16 PM 14108288 Order of Volatility - 2.3.mp4
6/15/2017 5:16 PM 15346401 Overview of Data Encryption - 4.3.mp4
6/15/2017 5:16 PM 28886637 Overview of Kerberos - 5.1.mp4
6/15/2017 5:16 PM 17738177 Overview of LDAP - 5.1.mp4
6/15/2017 5:16 PM 17202158 Overview of Load Balancers and Proxies - 1.1.mp4
6/15/2017 5:16 PM 15386808 Overview of Network Ports - 1.5.mp4
6/15/2017 5:16 PM 9462702 Overview of Protocol Analyzers - 1.1.mp4
6/15/2017 5:16 PM 25267386 Overview of Virtualization - 4.2.mp4
6/15/2017 5:16 PM 6555234 Overview of Virtualization Technology - 1.3.mp4
6/15/2017 5:16 PM 6266640 Overview of VPN Concentrators - 1.1.mp4
6/15/2017 5:16 PM 16284679 Overview of Vulnerability Scanning - 3.8.mp4
6/15/2017 5:16 PM 8681506 Overview of Web Application Firewalls - 1.1.mp4
6/15/2017 5:16 PM 11949423 Patch Management - 4.2.mp4
6/15/2017 5:16 PM 28292065 Penetration Testing - 3.8.mp4
6/15/2017 5:16 PM 7576972 Personally Identifiable Information - 2.4.mp4
6/15/2017 5:16 PM 15540776 Physical Port Security - 3.6.mp4
6/15/2017 5:16 PM 16458465 Physical Security - 3.6.mp4
6/15/2017 5:16 PM 9193237 Planning Testing and Operational Continuity - 2.5.mp4
6/15/2017 5:16 PM 11450559 Privileges - 5.3.mp4
6/15/2017 5:16 PM 12115510 Public and Private Keys - 6.3.mp4
6/15/2017 5:16 PM 9444449 Public Key Infrastructure - 6.3.mp4
6/15/2017 5:16 PM 14665297 RADIUS and TACACS - 5.1.mp4
6/15/2017 5:16 PM 12750595 Recovery Time Objectives - 2.7.mp4
6/15/2017 5:16 PM 33690195 Reducing Risk with Security Policies - 2.1.mp4
6/15/2017 5:16 PM 9538832 Redundancy and Single Points of Failure - 2.5.mp4
6/15/2017 5:16 PM 27945633 Redundancy Fault Tolerance and High Availability - 2.7.mp4
6/15/2017 5:16 PM 8545968 Remote Access - 1.3.mp4
6/15/2017 5:16 PM 9091060 Risk Avoidance - 2.1.mp4
6/15/2017 5:16 PM 14135264 Risk Calculations - 2.1.mp4
6/15/2017 5:16 PM 13834167 Rogue Access Points and Evil Twins - 3.4.mp4
6/15/2017 5:16 PM 21475391 Routers Firewalls and Switches - 1.1.mp4
6/15/2017 5:16 PM 8390635 Screenshots and Witnesses - 2.3.mp4
6/15/2017 5:16 PM 13687319 Secure Coding Concepts - 4.1.mp4
6/15/2017 5:16 PM 7890753 Secure Router Configuration - 1.2.mp4
6/15/2017 5:16 PM 9681982 Security Audits - 2.2.mp4
6/15/2017 5:16 PM 6149793 Security Controls - 2.2.mp4
6/15/2017 5:16 PM 6229313 Security Policy Training and Procedures - 2.4.mp4
6/15/2017 5:16 PM 11311542 Security Posture - 3.6.mp4
6/15/2017 5:16 PM 20567416 Security Reporting - 3.6.mp4
6/15/2017 5:16 PM 7275834 Sensitivity of Data - 2.4.mp4
6/15/2017 5:16 PM 9487302 Shoulder Surfing - 3.3.mp4
6/15/2017 5:16 PM 9853048 Single Sign-on - 5.2.mp4
6/15/2017 5:16 PM 5922696 Social Networking and Peer-to-Peer Security - 2.4.mp4
6/15/2017 5:16 PM 14519833 Spanning Tree Protocol and Loop Protection - 1.2.mp4
6/15/2017 5:15 PM 8709070 SSH and Encrypted File Transfer - 1.4.mp4
6/15/2017 5:15 PM 13113806 Steganography - 6.1.mp4
6/15/2017 5:15 PM 8472287 Subnetting the Network - 1.3.mp4
6/15/2017 5:15 PM 15877706 Switch Port Security and 802.1x - 1.2.mp4
6/15/2017 5:15 PM 19596768 Symmetric Encryption Ciphers - 6.2.mp4
6/15/2017 5:15 PM 12329670 Symmetric vs. Asymmetric Encryption - 6.1.mp4
6/15/2017 5:15 PM 9365487 System Images - 2.3.mp4
6/15/2017 5:15 PM 11401948 Tailgating - 3.3.mp4
6/15/2017 5:15 PM 7785571 Telephony Overview - 1.3.mp4
6/15/2017 5:15 PM 10336674 Time Offsets - 2.3.mp4
6/15/2017 5:15 PM 23946607 Transport Encryption - 6.1.mp4
6/15/2017 5:15 PM 25474281 Transport Encryption Algorithms - 6.2.mp4
6/15/2017 5:15 PM 9553739 Trust Models - 6.3.mp4
6/15/2017 5:15 PM 9473588 Trusted OS - 5.2.mp4
6/15/2017 5:15 PM 14933940 Understanding Buffer Overflows - 3.5.mp4
6/15/2017 5:15 PM 20026755 Understanding CHAP PAP and NTLM - 6.2.mp4
6/15/2017 5:15 PM 13940254 Understanding Contingency Plans - 2.7.mp4
6/15/2017 5:15 PM 12871753 Understanding Data Loss Prevention - 4.3.mp4
6/15/2017 5:15 PM 18662474 Understanding Denial of Service - 3.2.mp4
6/15/2017 5:15 PM 11686218 Understanding Directory Traversal and Command Injection - 3.5.mp4
6/15/2017 5:15 PM 6082577 Understanding DNS - 1.4.mp4
6/15/2017 5:15 PM 32957037 Understanding Fuzzing - 4.1.mp4
6/15/2017 5:15 PM 16909689 Understanding Hardware-based Encryption - 4.3.mp4
6/15/2017 5:15 PM 14462588 Understanding Hashing - 2.3.mp4
6/15/2017 5:15 PM 12064502 Understanding Insider Threats - 3.2.mp4
6/15/2017 5:15 PM 5239641 Understanding IPsec - 1.4.mp4
6/15/2017 5:15 PM 9955762 Understanding Logic Bombs - 3.1.mp4
6/15/2017 5:15 PM 23867681 Understanding Man-in-the-Middle and ARP Poisoning - 3.2.mp4
6/15/2017 5:15 PM 10989371 Understanding Network Address Translation - 1.3.mp4
6/15/2017 5:15 PM 21556066 Understanding Phishing - 3.2.mp4
6/15/2017 5:15 PM 12978018 Understanding Single-Factor Authentication - 5.2.mp4
6/15/2017 5:15 PM 17058354 Understanding SQL Injection XML Injection and LDAP Injection - 3.5.mp4
6/15/2017 5:15 PM 23220217 Understanding the Christmas Tree Attack - 3.2.mp4
6/15/2017 5:15 PM 11830999 Understanding Transitive and Client-Side Attacks - 3.2.mp4
6/15/2017 5:15 PM 30082030 Understanding Trojans and Backdoors - 3.1.mp4
6/15/2017 5:15 PM 26280771 Understanding Viruses and Worms - 3.1.mp4
6/15/2017 5:15 PM 11125634 Understanding Vishing - 3.3.mp4
6/15/2017 5:15 PM 5914406 Understanding VLANs - 1.3.mp4
6/15/2017 5:15 PM 16472859 Understanding Zero-day Attacks - 3.5.mp4
6/15/2017 5:15 PM 13007642 User Habits and Threat Awareness - 2.4.mp4
6/15/2017 5:15 PM 17209829 User Identification and Authentication - 5.2.mp4
6/15/2017 5:15 PM 7745656 User Rights and Permissions - 2.2.mp4
6/15/2017 5:15 PM 6195805 Video Capture - 2.3.mp4
6/15/2017 5:15 PM 10658397 Virtualization Risks - 2.1.mp4
6/15/2017 5:15 PM 11203502 VLAN Management - 1.2.mp4
6/15/2017 5:15 PM 17864053 Vulnerability Scanning Overview - 3.7.mp4
6/15/2017 5:15 PM 13510257 Wardriving and Warchalking - 3.4.mp4
6/15/2017 5:15 PM 12950668 WEP and WPA - 1.6.mp4
6/15/2017 5:15 PM 11961423 WEP vs. WPA - 6.2.mp4
6/15/2017 5:15 PM 10558847 Whaling - 3.3.mp4
6/15/2017 5:15 PM 14916321 Whole Disk Encryption - 6.2.mp4
6/15/2017 5:15 PM 13864946 Wireless Interference - 3.4.mp4
6/15/2017 5:15 PM 21927376 Wireless Packet Analysis - 3.4.mp4
6/15/2017 5:15 PM 7895547 Wireless Power and Antenna Placement - 1.6.mp4