FILENAME SIZE ~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.mp4 23.9 MB ~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.srt 4.7 KB ~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.mp4 17.3 MB ~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.srt 6.4 KB ~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.mp4 29.9 MB ~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.srt 5.4 KB ~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.mp4 40.5 MB ~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.srt 7.1 KB ~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.mp4 65.4 MB ~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.srt 11.3 KB ~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.mp4 42.6 MB ~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.srt 4 KB ~Get Your Files Here !/1. Defense in Depth/15. Backups.mp4 44 MB ~Get Your Files Here !/1. Defense in Depth/15. Backups.srt 10.9 KB ~Get Your Files Here !/1. Defense in Depth/16. Quiz.html 209 B ~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.mp4 28.1 MB ~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.srt 10.1 KB ~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.mp4 35.7 MB ~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.srt 6.5 KB ~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.mp4 30.5 MB ~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.srt 6.9 KB ~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.mp4 23.6 MB ~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.srt 6.1 KB ~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.mp4 21.7 MB ~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.srt 6.3 KB ~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.mp4 31.7 MB ~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.srt 6 KB ~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.mp4 153.2 MB ~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.srt 8.4 KB ~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.mp4 23.1 MB ~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.srt 6.4 KB ~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.mp4 90.2 MB ~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.srt 13.9 KB ~Get Your Files Here !/2. Operating System Security/10. VPNs.mp4 55.5 MB ~Get Your Files Here !/2. Operating System Security/11. Quiz.html 209 B ~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.mp4 33.1 MB ~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.srt 6 KB ~Get Your Files Here !/2. Operating System Security/3. Authentication.mp4 23 MB ~Get Your Files Here !/2. Operating System Security/3. Authentication.srt 6.4 KB ~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.mp4 17.5 MB ~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.srt 4.6 KB ~Get Your Files Here !/2. Operating System Security/5. MFA.mp4 52.4 MB ~Get Your Files Here !/2. Operating System Security/5. MFA.srt 9.4 KB ~Get Your Files Here !/2. Operating System Security/6. Audits and logs.mp4 36.7 MB ~Get Your Files Here !/2. Operating System Security/6. Audits and logs.srt 8.5 KB ~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.mp4 21.5 MB ~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.srt 7.9 KB ~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.mp4 39.8 MB ~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.srt 8.8 KB ~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.mp4 36.6 MB ~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.srt 6.1 KB ~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.mp4 46.5 MB ~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.srt 9.2 KB ~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.mp4 64.1 MB ~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.srt 8.9 KB ~Get Your Files Here !/Bonus Resources.txt 386 B