BITCQ

UD72

Size: 4.1 GB
Magnet link

Name Size
UD72/01 Introduction/001 Introduction.mp4 20.8 MB
UD72/02 Security and Risk Management/002 Security and Risk Management.mp4.part 1.2 MB
UD72/02 Security and Risk Management/003 Importance of Information Security and Risk Management.mp4 10.7 MB
UD72/02 Security and Risk Management/004 Information Security.mp4 12.4 MB
UD72/02 Security and Risk Management/005 IT Security and Organizational Goals Mission and Objectives.mp4 16.7 MB
UD72/02 Security and Risk Management/006 Organizational Processes.mp4 54.3 MB
UD72/02 Security and Risk Management/007 Security Policies.mp4 28.3 MB
UD72/02 Security and Risk Management/008 Policy Chart.mp4 17.8 MB
UD72/02 Security and Risk Management/009 Compliance.mp4 27 MB
UD72/02 Security and Risk Management/010 Computer Crimes.mp4 34.8 MB
UD72/02 Security and Risk Management/011 Major Legal Systems.mp4 23.9 MB
UD72/02 Security and Risk Management/012 Introduction to Intellectual Property (IP) Law.mp4 32.2 MB
UD72/02 Security and Risk Management/013 Import or Export Controls and Trans-Border Data Flow.mp4 16.3 MB
UD72/02 Security and Risk Management/014 U.S. Privacy Laws.mp4 34.3 MB
UD72/02 Security and Risk Management/015 General Data Protection Regulation (GDPR).mp4 33.9 MB
UD72/02 Security and Risk Management/016 Security.mp4 17.4 MB
UD72/02 Security and Risk Management/017 Risk Analysis.mp4 27.1 MB
UD72/02 Security and Risk Management/018 Risk Analysis Types.mp4 31.5 MB
UD72/02 Security and Risk Management/019 Countermeasure SelectionProblem.mp4 50.9 MB
UD72/02 Security and Risk Management/020 Importance of Business Continuity Planning.mp4 32.8 MB
UD72/02 Security and Risk Management/021 Business Impact Analysis.mp4 12.8 MB
UD72/02 Security and Risk Management/022 Maximum Tolerable Downtime (MTD).mp4 12.7 MB
UD72/02 Security and Risk Management/023 Failure and Recovery Metrics.mp4 35.4 MB
UD72/02 Security and Risk Management/024 Importance of Managing Personnel Security.mp4 4.6 MB
UD72/02 Security and Risk Management/025 Vendor Contractors and Consultant Controls.mp4 12.7 MB
UD72/02 Security and Risk Management/026 Importance of Security Awareness Training.mp4 31.3 MB
UD72/02 Security and Risk Management/027 Best Practices.mp4 36.5 MB
UD72/02 Security and Risk Management/028 Conclusion.mp4 6.3 MB
UD72/03 Asset Security/029 Asset Security.mp4 8 MB
UD72/03 Asset Security/030 Information Classification.mp4 27.5 MB
UD72/03 Asset Security/031 Data Lifecycle.mp4 30.6 MB
UD72/03 Asset Security/032 Data Management.mp4 24.4 MB
UD72/03 Asset Security/033 Data Custodians.mp4 11.3 MB
UD72/03 Asset Security/034 Data Quality.mp4 5.3 MB
UD72/03 Asset Security/035 Data Documentation.mp4 15.8 MB
UD72/03 Asset Security/036 Data Access Sharing and Dissemination.mp4 16.1 MB
UD72/03 Asset Security/037 Media Resource Protection.mp4 21.9 MB
UD72/03 Asset Security/038 Data Remanence.mp4 20.5 MB
UD72/03 Asset Security/039 Software Licensing.mp4 25.1 MB
UD72/03 Asset Security/040 Data Security Controls.mp4 15.9 MB
UD72/03 Asset Security/041 Scoping and Tailoring.mp4 12.1 MB
UD72/03 Asset Security/042 Standards Selection.mp4 24.5 MB
UD72/03 Asset Security/043 Conclusion.mp4 7.5 MB
UD72/04 Security Architecture and Engineering/044 Security Engineering.mp4 10.2 MB
UD72/04 Security Architecture and Engineering/045 Architecture Framework.mp4 129.3 MB
UD72/04 Security Architecture and Engineering/046 Security Standards.mp4 21.8 MB
UD72/04 Security Architecture and Engineering/047 Security Models.mp4 79.3 MB
UD72/04 Security Architecture and Engineering/048 Evaluation Criteria.mp4 40.5 MB
UD72/04 Security Architecture and Engineering/049 Security Standard.mp4 39.6 MB
UD72/04 Security Architecture and Engineering/050 System Security Architecture.mp4 9.2 MB
UD72/04 Security Architecture and Engineering/051 System Components.mp4 42.5 MB
UD72/04 Security Architecture and Engineering/052 Distributed Systems.mp4 30.9 MB
UD72/04 Security Architecture and Engineering/053 Security Threats and Countermeasures.mp4 29 MB
UD72/04 Security Architecture and Engineering/054 Internet of Things (IoT).mp4 22.9 MB
UD72/04 Security Architecture and Engineering/055 Industrial Control System (ICS).mp4 36.1 MB
UD72/04 Security Architecture and Engineering/056 Best Practices.mp4 25.4 MB
UD72/04 Security Architecture and Engineering/057 Cryptography.mp4 74.3 MB
UD72/04 Security Architecture and Engineering/058 Symmetric Cryptography.mp4 40.2 MB
UD72/04 Security Architecture and Engineering/059 Data Encryption Standard (DES).mp4 63 MB
UD72/04 Security Architecture and Engineering/060 Advanced Encryption Standard (AES).mp4 55.1 MB
UD72/04 Security Architecture and Engineering/061 Asymmetric Cryptography.mp4 46.4 MB
UD72/04 Security Architecture and Engineering/062 Symmetric vs. Asymmetric Cryptography.mp4 12.9 MB
UD72/04 Security Architecture and Engineering/063 Public Key Infrastructure.mp4 38.7 MB
UD72/04 Security Architecture and Engineering/064 Hash function.mp4 68.7 MB
UD72/04 Security Architecture and Engineering/065 Physical and Environmental Security.mp4 30.8 MB
UD72/04 Security Architecture and Engineering/066 Design Criteria.mp4 69.9 MB
UD72/04 Security Architecture and Engineering/067 Operational Areas.mp4 10.3 MB
UD72/04 Security Architecture and Engineering/068 Environmental Controls.mp4 54 MB
UD72/04 Security Architecture and Engineering/069 Conclusion.mp4 2.5 MB
UD72/05 Communications and Network Security/070 Communications and Network Security.mp4 8.8 MB
UD72/05 Communications and Network Security/071 Open Systems Interconnection.mp4 10.6 MB
UD72/05 Communications and Network Security/072 OSI Layers.mp4 45.1 MB
UD72/05 Communications and Network Security/073 Protocol Models.mp4 44.6 MB
UD72/05 Communications and Network Security/074 IP Addressing.mp4 16.8 MB
UD72/05 Communications and Network Security/075 Domain Routing.mp4 18.1 MB
UD72/05 Communications and Network Security/076 Types of Network Protocols.mp4 23 MB
UD72/05 Communications and Network Security/077 LAN Network Technologies.mp4 21.5 MB
UD72/05 Communications and Network Security/078 Network Topologies.mp4 34 MB
UD72/05 Communications and Network Security/079 List of Networking Devices.mp4 36.4 MB
UD72/05 Communications and Network Security/080 Networks.mp4 36.2 MB
UD72/05 Communications and Network Security/081 WAN Technologies.mp4 42.5 MB
UD72/05 Communications and Network Security/082 Remote Access Technolgy.mp4 34.5 MB
UD72/05 Communications and Network Security/083 IPsec Security Protocols.mp4 29.7 MB
UD72/05 Communications and Network Security/084 Remote Access Security Methods.mp4 12.8 MB
UD72/05 Communications and Network Security/085 Bluetooth.mp4 52.3 MB
UD72/05 Communications and Network Security/086 Network Attacks.mp4 57.4 MB
UD72/05 Communications and Network Security/087 Conclusion.mp4 1.8 MB
UD72/06 Identity and Access Management (IAM)/088 Identity and Access Management.mp4 23.5 MB
UD72/06 Identity and Access Management (IAM)/089 User Identification.mp4 31.5 MB
UD72/06 Identity and Access Management (IAM)/090 Cards and Smart Cards.mp4 43.9 MB
UD72/06 Identity and Access Management (IAM)/091 Kerberos.mp4 35 MB
UD72/06 Identity and Access Management (IAM)/092 Access Control.mp4 28.7 MB
UD72/06 Identity and Access Management (IAM)/093 Attribute-Based Access Control (ABAC).mp4 10.6 MB
UD72/06 Identity and Access Management (IAM)/094 Access Control Concepts.mp4 34.3 MB
UD72/06 Identity and Access Management (IAM)/095 Credential Management Systems.mp4 2.8 MB
UD72/06 Identity and Access Management (IAM)/096 Identity Management.mp4 50.5 MB
UD72/06 Identity and Access Management (IAM)/097 Unauthorized Disclosure of Information.mp4 35.2 MB
UD72/06 Identity and Access Management (IAM)/098 Threats to Access Control.mp4 26.2 MB
UD72/06 Identity and Access Management (IAM)/099 Conclusion.mp4 3.4 MB
UD72/07 Security Assessment and Testing/100 Security Assessment and Testing.mp4 2.3 MB
UD72/07 Security Assessment and Testing/101 Assessment and Test Strategies.mp4 8.5 MB
UD72/07 Security Assessment and Testing/102 Log Management.mp4 19.4 MB
UD72/07 Security Assessment and Testing/103 Synthetic Transactions.mp4 4.6 MB
UD72/07 Security Assessment and Testing/104 Testing Techniques.mp4 22.4 MB
UD72/07 Security Assessment and Testing/105 Information Security Continuous Monitoring.mp4 80.2 MB
UD72/07 Security Assessment and Testing/106 Service Organization Controls.mp4 18.4 MB
UD72/07 Security Assessment and Testing/107 Audit Preparation.mp4 10.8 MB
UD72/07 Security Assessment and Testing/108 Conclusion.mp4 5.7 MB
UD72/08 Security Operations/109 Security Operations.mp4 727 KB
UD72/08 Security Operations/110 Investigations.mp4 22.5 MB
UD72/08 Security Operations/111 Forensic Investigation Guidelines.mp4 5.6 MB
UD72/08 Security Operations/112 Incident Response.mp4 17.6 MB
UD72/08 Security Operations/113 Evidence.mp4 22.8 MB
UD72/08 Security Operations/114 Computer Forensics Procedure.mp4 1.6 MB
UD72/08 Security Operations/115 Requirements for Investigation Types.mp4 33.1 MB
UD72/08 Security Operations/116 Data Leakor Loss Prevention DLP.mp4 9.5 MB
UD72/08 Security Operations/117 Introduction to Security Operations.mp4 5 MB
UD72/08 Security Operations/118 Effects of Operations Controls on C.I.A.mp4 7.8 MB
UD72/08 Security Operations/119 Threats to Operations.mp4 72.5 MB
UD72/08 Security Operations/120 Types of Accounts.mp4 13.5 MB
UD72/08 Security Operations/121 Protecting.mp4 74.7 MB
UD72/08 Security Operations/122 Cloud and Virtual Storage.mp4 13.3 MB
UD72/08 Security Operations/123 Incident ManagementDetection Phase.mp4 22.3 MB
UD72/08 Security Operations/124 Monitoring.mp4 13.7 MB
UD72/08 Security Operations/125 Operating and Maintaining Preventive Measures.mp4 47.9 MB
UD72/08 Security Operations/126 Recovery Strategy.mp4 37.1 MB
UD72/08 Security Operations/127 Backup Sites.mp4 43.4 MB
UD72/08 Security Operations/128 Importance of Maintaining Resilient Systems.mp4 29.7 MB
UD72/08 Security Operations/129 Disaster Recovery.mp4 10.9 MB
UD72/08 Security Operations/130 Importance of Testing.mp4 17 MB
UD72/08 Security Operations/131 Disaster Recovery PhasesMaintenance.mp4 63 MB
UD72/08 Security Operations/132 Importance of Lighting.mp4 14.6 MB
UD72/08 Security Operations/133 Access Control.mp4 69.8 MB
UD72/08 Security Operations/134 Building and Inside Security.mp4 2.7 MB
UD72/08 Security Operations/135 Conclusion.mp4 3 MB
UD72/09 Software Development Security/136 Software Development Security.mp4 2.6 MB
UD72/09 Software Development Security/137 Environments.mp4 4.4 MB
UD72/09 Software Development Security/138 Distributed Data Processing and Agents.mp4 38.5 MB
UD72/09 Software Development Security/139 Threats in the Software Environment.mp4 42.3 MB
UD72/09 Software Development Security/140 System Life Cycle and Systems Development.mp4 67.7 MB
UD72/09 Software Development Security/141 Software Development Methods.mp4 14.6 MB
UD72/09 Software Development Security/142 Object-Oriented Programming Terms.mp4 9.8 MB
UD72/09 Software Development Security/143 Object Request Brokers.mp4 14.3 MB
UD72/09 Software Development Security/144 Software Security and Assurance.mp4 80.9 MB
UD72/09 Software Development Security/145 Audit and Assurance Mechanisms.mp4 4.7 MB
UD72/09 Software Development Security/146 Assessing the Effectiveness of Software Security.mp4 25.1 MB
UD72/09 Software Development Security/147 Database.mp4 18.7 MB
UD72/09 Software Development Security/148 Data Warehousing.mp4 29.8 MB
UD72/09 Software Development Security/149 Malwares.mp4 26.4 MB
UD72/09 Software Development Security/150 Importance and Role of Knowledge Management.mp4 8.9 MB
UD72/09 Software Development Security/151 Web Application Environment.mp4 25.2 MB
UD72/09 Software Development Security/152 OWASP Secure Coding Practices.mp4 31.5 MB
UD72/09 Software Development Security/153 Conclusion.mp4 5.9 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
UD72 Video 4.1 GB 4
UD72 Video 4.1 GB 1

Loading...