kingers Posted March 23 Report Share Posted March 23 1.13 GB | 00:13:07 | mp4 | 1280X720 | 16:9Genre:eLearning |Language:EnglishFiles Included :01 introduction-to-the-ata-program.mp4 (21.95 MB)02 overview-of-ata-track.mp4 (6.46 MB)03 advice-for-completing-the-ata-program.mp4 (25.02 MB)05 security-course-syllabus.mp4 (28.58 MB)01 security.mp4 (5.51 MB)02 risk.mp4 (15.15 MB)03 security-management-process.mp4 (6.8 MB)01 physical-security.mp4 (6.28 MB)02 physical-security-controls.mp4 (9.97 MB)03 environmental-exposures.mp4 (12.5 MB)01 security-fundamentals-review.mp4 (27.02 MB)01 authentication.mp4 (10.64 MB)02 authentication-factors.mp4 (12.74 MB)03 strong-passwords.mp4 (13.71 MB)01 multiple-and-shared-accounts.mp4 (8.42 MB)02 account-management.mp4 (10.42 MB)03 single-sign-on.mp4 (12.2 MB)04 access-control.mp4 (13.83 MB)01 authentication-and-account-management-review.mp4 (47.2 MB)01 hardening-endpoints.mp4 (11.03 MB)02 patch-management.mp4 (10.45 MB)03 application-control.mp4 (8.25 MB)01 mobile-devices.mp4 (16.66 MB)02 location-services.mp4 (9.81 MB)03 application-control.mp4 (8.25 MB)01 device-security-review.mp4 (40.83 MB)01 cryptography-overview.mp4 (10.95 MB)02 symmetric-encryption.mp4 (10.24 MB)03 asymmetric-encryption.mp4 (13.17 MB)04 hashes.mp4 (8.41 MB)01 digital-certificates.mp4 (17.37 MB)02 digital-signatures.mp4 (7.6 MB)03 https-example.mp4 (13.88 MB)01 public-key-infrastructure.mp4 (12.26 MB)02 certificate-life-cycle.mp4 (11.18 MB)03 key-escrow.mp4 (6.62 MB)01 cryptography-fundamentals-review.mp4 (33.14 MB)02 defense-in-depth.mp4 (15.37 MB)03 firewalls.mp4 (9.67 MB)04 intrusion-detection-and-prevention-systems.mp4 (10.83 MB)01 wireless-networks.mp4 (10.15 MB)03 implementing-wireless.mp4 (10.68 MB)04 securing-wireless.mp4 (13.55 MB)01 remote-access.mp4 (8.91 MB)02 remote-access-protocols.mp4 (14.49 MB)03 cloud-computing.mp4 (15.77 MB)01 network-security-review.mp4 (42.79 MB)01 vulnerability-scanning.mp4 (11.39 MB)02 ethical-hacking.mp4 (15.34 MB)01 data-security.mp4 (8.65 MB)02 security-documents.mp4 (13.8 MB)03 typical-security-policies.mp4 (12.35 MB)04 risk.mp4 (9.49 MB)05 compliance.mp4 (13.51 MB)01 security-management-review.mp4 (39.89 MB)01 attackers.mp4 (9.43 MB)02 social-engineering.mp4 (13.96 MB)03 web-attacks.mp4 (16.41 MB)01 malware.mp4 (17.18 MB)02 software-network-attacks.mp4 (13.39 MB)03 wireless-attacks.mp4 (7.66 MB)04 password-attacks.mp4 (7.94 MB)01 security-threats-review.mp4 (61.12 MB)01 respond-to-security-incidents-review.mp4 (54.71 MB)01 capstone-introduction.mp4 (8.05 MB)02 capstone-instructions.mp4 (48.71 MB)03 powerpoint-tutorial.mp4 (41.9 MB)]Screenshot https://rapidgator.net/file/d4ac9b80d8cc2840ecbbebccad7ab891/Coursera.-.Introduction.to.IT.Security.part1.rarhttps://rapidgator.net/file/0019efd8455544da6905261c832ac187/Coursera.-.Introduction.to.IT.Security.part2.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now