BITCQ

ITPT141

Size: 77.7 GB
Magnet link

Name Size
ITPT141/0 - Overview.mp4 145 MB
ITPT141/1.11 - Confidentiality, Integrity, Availability (CIA).mp4 568 MB
ITPT141/1.12 - Confidentiality, Integrity, Availability (CIA) Pt2.mp4 368.3 MB
ITPT141/1.21 - Evaluate, Apply Security Governance Principles.mp4 394.5 MB
ITPT141/1.22 - Evaluate, Apply Security Goverance Principles Pt2.mp4 1.1 GB
ITPT141/1.31 - Determine Compliance Requirements.mp4 432.8 MB
ITPT141/1.32 - Determine Compliance Requirements Part 2.mp4 871.4 MB
ITPT141/1.33 - Determine Compliance Requirements Part 3.mp4 395.9 MB
ITPT141/1.41 - Understand Legal and Regulatory Issues.mp4 505 MB
ITPT141/1.42 - Understand Legal and Regulatory Issues Part 2.mp4 491 MB
ITPT141/1.51 - Understand, adhere to and promote ethics.mp4 128.8 MB
ITPT141/1.61 - Policy, Standards, Procedures and Guidelines.mp4 222.9 MB
ITPT141/1.71 - Understand Business Continuity Requirements.mp4 809.5 MB
ITPT141/1.72 - Understand Business Continuity Requirements Part 2.mp4 743.1 MB
ITPT141/1.73 - Understand Business Continuity Requirements Part 3.mp4 600.9 MB
ITPT141/1.81 - Personnel, Security Policies and Procedures.mp4 653.6 MB
ITPT141/1.911 - Understand_Apply Risk Management Concepts.mp4 563.6 MB
ITPT141/1.912 - Understand_Apply Risk Management Concepts Part 2.mp4 573.8 MB
ITPT141/1.913 - Understand_Apply Risk Management Concepts Part 3.mp4 426 MB
ITPT141/1.914 - Understand_Apply Risk Management Concepts Part 4.mp4 449.8 MB
ITPT141/1.915 - Understand_Apply Risk Management Concepts Part 5.mp4 453.4 MB
ITPT141/1.921 - Understanding_Apply Threat Modeling Concepts.mp4 635.1 MB
ITPT141/1.931 - Apply Risk Management to the Supply Chain.mp4 474 MB
ITPT141/1.941 - Security Awareness_Education and Training.mp4 207 MB
ITPT141/1.951 - Security and Risk Management - Key Points.mp4 325.7 MB
ITPT141/1.961 - CIA Deep Dive.mp4 806 MB
ITPT141/1.971 - Organizational Roles and Responsibilities.mp4 361.5 MB
ITPT141/1.981 - Risk Terminology and Concepts.mp4 484.3 MB
ITPT141/2.11 - Identify and Classify Information and Assets.mp4 497.6 MB
ITPT141/2.21 - Determine and Maintain Information_Asset Ownership.mp4 326.1 MB
ITPT141/2.31 - Protect Privacy.mp4 697.4 MB
ITPT141/2.32 - Protect Privacy Part 2.mp4 748.9 MB
ITPT141/2.41 - Ensure Appropriate Asset Retention.mp4 314.1 MB
ITPT141/2.51 - Determine Data Security Controls.mp4 582.8 MB
ITPT141/2.52 - Determine Data Security Controls Part 2.mp4 583.1 MB
ITPT141/2.53 - Determine Data Security Controls Part 3.mp4 556.6 MB
ITPT141/2.61 - Establish Asset Handling Requirements.mp4 603.2 MB
ITPT141/2.71 - Asset Security - Key Points.mp4 176.1 MB
ITPT141/3.11 - Implement and Manage Engineering Processes.mp4 742.8 MB
ITPT141/3.21 - Fundamental Concepts of Systems and Security.mp4 656.3 MB
ITPT141/3.22 - Fundamental Concepts of Systems and Security Pt.2.mp4 473.2 MB
ITPT141/3.23 - Fundamental Concepts of Systems and Security Pt.3.mp4 526.9 MB
ITPT141/3.24 - Fundamental Concepts of Systems and Security Pt.4.mp4 456.1 MB
ITPT141/3.25 - Fundamental Concepts of Systems and Security Pt.5.mp4 467.8 MB
ITPT141/3.31 - Controls Based on Security Requirements.mp4 365.3 MB
ITPT141/3.32 - Controls Based on Security Requirements Part 2.mp4 293.9 MB
ITPT141/3.41 - Vulnerabilities of Security Architecture.mp4 760 MB
ITPT141/3.42 - Vulnerabilities of Security Architecture Part 2.mp4 560.2 MB
ITPT141/3.43 - Vulnerabilities of Security Architecture Part 3.mp4 627.7 MB
ITPT141/3.44 - Vulnerabilities of Security Architectures Part 4.mp4 434.1 MB
ITPT141/3.51 - Vulnerabilities in Web-Based Systems.mp4 406.4 MB
ITPT141/3.52 - Vulnerabilities in Web-Based Systems Part 2.mp4 379 MB
ITPT141/3.61 - Vulnerabilities in Mobile Systems.mp4 307.7 MB
ITPT141/3.71 - Vulnerabilities in Embedded Devices.mp4 258 MB
ITPT141/3.81 - Apply Cryptography.mp4 442.7 MB
ITPT141/3.82 - Apply Cryptography Part 2.mp4 566.2 MB
ITPT141/3.83 - Apply Cryptography Part 3.mp4 507.3 MB
ITPT141/3.84 - Apply Cryptography Part 4.mp4 380.8 MB
ITPT141/3.85 - Apply Cryptography Part 5.mp4 455.4 MB
ITPT141/3.86 - Apply Cryptography Part 6.mp4 429.3 MB
ITPT141/3.87 - Apply Cryptography Part 7.mp4 290.5 MB
ITPT141/3.88 - Apply Cryptography Part 8.mp4 541.7 MB
ITPT141/3.891 - Apply Cryptography Part 9.mp4 457.4 MB
ITPT141/3.892 - Apply Cryptography Part 10.mp4 478.8 MB
ITPT141/3.893 - Apply Cryptography Part 11.mp4 523.4 MB
ITPT141/3.894 - Apply Cryptography Part 12.mp4 513.4 MB
ITPT141/3.895 - Apply Cryptography Part 13.mp4 527 MB
ITPT141/3.91 - Site_Facility Design and Security.mp4 667.9 MB
ITPT141/3.912 - Site_Facility Design and Security Part 2.mp4 664.1 MB
ITPT141/3.913 - Site_Facility Design and Security Part 3.mp4 474.7 MB
ITPT141/3.914 - Site_Facility Design and Security Part 4.mp4 518.1 MB
ITPT141/3.921 - Security Architecture and Engineering - Key Points.mp4 250.8 MB
ITPT141/4.11 - Secure Design Principles in Networks.mp4 651.5 MB
ITPT141/4.12 - Secure Design Principles in Networks Part 2.mp4 787.9 MB
ITPT141/4.13 - Secure Design Principles in Networks Part 3.mp4 859.5 MB
ITPT141/4.14 - Secure Design Principles in Networks Part 4.mp4 648 MB
ITPT141/4.15 - Secure Design Principles in Networks Part 5.mp4 776.8 MB
ITPT141/4.16 - Secure Design Principles in Networks Part 6.mp4 403.4 MB
ITPT141/4.17 - Secure Design Principles in Networks Part 7.mp4 576.5 MB
ITPT141/4.18 - Secure Design Principles in Networks Part 8.mp4 667.1 MB
ITPT141/4.19 - Secure Design Principles in Networks Part 9.mp4 493.6 MB
ITPT141/4.192 - Secure Design Principles in Networks Part 10.mp4 664.3 MB
ITPT141/4.193 - Secure Design Principles in Networks Part 11.mp4 408.2 MB
ITPT141/4.194 - Secure Design Principles in Networks Part 12.mp4 497.4 MB
ITPT141/4.21 - Secure Network Components.mp4 687.9 MB
ITPT141/4.22 - Secure Network Components Part 2.mp4 754.4 MB
ITPT141/4.23 - Secure Network Components Part 3.mp4 639.9 MB
ITPT141/4.24 - Secure Network Components Part 4.mp4 604.9 MB
ITPT141/4.25 - Secure Network Components Part 5.mp4 452.6 MB
ITPT141/4.31 - Implement Secure Communication Channels.mp4 495.3 MB
ITPT141/4.32 - Implement Secure Communication Channels Part 2.mp4 423 MB
ITPT141/4.33 - Implement Secure Communication Channels Part 3.mp4 533.9 MB
ITPT141/4.34 - Implement Secure Communication Channels Part 4.mp4 480.3 MB
ITPT141/4.35 - Implement Secure Communication Channels Part 5.mp4 392.2 MB
ITPT141/4.36 - Implement Secure Communication Channels Part 6.mp4 369.7 MB
ITPT141/4.41 - Communication and Network Security - Key Points.mp4 186.8 MB
ITPT141/5.11 - Control Physical and Logical Access to Assets.mp4 454.3 MB
ITPT141/5.12 - Control Physical and Logical Access to Assets Pt 2.mp4 534.6 MB
ITPT141/5.21 - Manage Identification and Authentication.mp4 522.1 MB
ITPT141/5.22 - Manage Identification and Authentication Part 2.mp4 670.4 MB
ITPT141/5.23 - Manage Identification and Authentication Part 3.mp4 225.5 MB
ITPT141/5.31 - Integrate Identity as a Third-Party Service.mp4 717.6 MB
ITPT141/5.41 - Implement_Manage Authorization Mechanisms.mp4 502.1 MB
ITPT141/5.42 - Implement_Manage Authorization Mechanisms Pt.2.mp4 568.4 MB
ITPT141/5.51 - Manage Identity and Access Provisioning Lifecycle.mp4 390.5 MB
ITPT141/5.61 - Access Control Attacks.mp4 510.7 MB
ITPT141/5.62 - Access Control Attacks Part 2.mp4 300.2 MB
ITPT141/5.71 - Identity and Access Management - Key Points.mp4 301.8 MB
ITPT141/6.11 - Assessment, Test and Audit.mp4 423.1 MB
ITPT141/6.12 - Assessment, Test and Audit Part 2.mp4 616.2 MB
ITPT141/6.21 - Conduct Security Control Testing.mp4 647.5 MB
ITPT141/6.22 - Conduct Security Control Testing Part 2.mp4 571.4 MB
ITPT141/6.23 - Conduct Security Control Testing Part 3.mp4 486.4 MB
ITPT141/6.31 - Collect Security Process Data.mp4 467.9 MB
ITPT141/6.41 - Security Assessment and Testing - Key Points.mp4 127.2 MB
ITPT141/7.11 - Understand and Support Investigations.mp4 521.5 MB
ITPT141/7.21 - Conduct Logging and Monitoring Activities.mp4 291.5 MB
ITPT141/7.31 - Provisioning and Protecting Resources.mp4 596.9 MB
ITPT141/7.32 - Provisioning and Protecting Resources Part 2.mp4 301 MB
ITPT141/7.41 - Apply Foundational Security Operation Concepts.mp4 235 MB
ITPT141/7.51 - Conduct Incident Management.mp4 328.4 MB
ITPT141/7.61 - Detective and Preventative Measures.mp4 537.4 MB
ITPT141/7.62 - Detective and Preventative Measures Part 2.mp4 772.1 MB
ITPT141/7.71 - Patch and Vulnerability Management.mp4 230.3 MB
ITPT141/7.81 - Understand Change Management.mp4 355.9 MB
ITPT141/7.91 - Implement Recovery Strategies.mp4 519 MB
ITPT141/7.912 - Implement Recovery Strategies Part 2.mp4 385.4 MB
ITPT141/7.913 - Implement Recovery Strategies Part 3.mp4 508.2 MB
ITPT141/7.914 - Implement Recovery Strategies Part 4.mp4 323.6 MB
ITPT141/7.915 - Implement Recovery Strategies Part 5.mp4 507.4 MB
ITPT141/7.921 - Implement and Test BCDR.mp4 713.7 MB
ITPT141/7.922 - Implement and Test BCDR Part 2.mp4 654 MB
ITPT141/7.923 - Implement and Test BCDR Part 3.mp4 193.6 MB
ITPT141/7.931 - Implement and Manage Physical Security.mp4 724.2 MB
ITPT141/7.932 - Implement and Manage Physical Security Part 2.mp4 638.8 MB
ITPT141/7.94 - Personnel Safety and Security Concerns.mp4 235 MB
ITPT141/7.95 - Security Operations - Key Points.mp4 317.4 MB
ITPT141/8.11 - Security in the SDLC.mp4 893 MB
ITPT141/8.12 - Security in the SDLC Part 2.mp4 436.8 MB
ITPT141/8.13 - Security in the SDLC Part 3.mp4 639.1 MB
ITPT141/8.14 - Security in the SDLC Part 4.mp4 671.7 MB
ITPT141/8.15 - Security in the SDLC Part 5.mp4 539.4 MB
ITPT141/8.16 - Security in the SDLC Part 6.mp4 148.4 MB
ITPT141/8.21 - Security Controls in Dev Environments.mp4 467.8 MB
ITPT141/8.22 - Security Controls in Dev Environments Part 2.mp4 734.2 MB
ITPT141/8.23 - Security Controls in Dev Environments Part 3.mp4 821.9 MB
ITPT141/8.24 - Security Controls in Dev Environments Part 4.mp4 613.6 MB
ITPT141/8.25 - Security Controls in Dev Environments Part 5.mp4 563.2 MB
ITPT141/8.26 - Security Controls in Dev Environments Part 6.mp4 515.5 MB
ITPT141/8.27 - Security Controls in Dev Environments Part 7.mp4 565.4 MB
ITPT141/8.28 - Security Controls in Dev Environments Part 8.mp4 635 MB
ITPT141/8.29 - Security Controls in Dev Environments Part 9.mp4 385.9 MB
ITPT141/8.31 - Assess Effectiveness of Software Security.mp4 554.4 MB
ITPT141/8.41 - Assess Security Impact of Acquired Software.mp4 218.7 MB
ITPT141/8.51 - Secure Coding Guidelines and Standards.mp4 462.7 MB
ITPT141/8.61 - Databases and Data Warehouses.mp4 567.8 MB
ITPT141/8.62 - Databases and Data Warehouses Part 2.mp4 426.7 MB
ITPT141/8.71 - Types of Storage.mp4 193.5 MB
ITPT141/8.81 - Knowledge-based Systems.mp4 263.3 MB
ITPT141/8.91 - Software Development Security - Key Points.mp4 191.8 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
ITPT141 Video 77.7 GB 1

Loading...