Filename Size 01 - Welcome And Overview.mkv 10.7 MB 01 - Welcome And Overview120.mkv 10.7 MB 02 - Network Security Devices.mkv 52.9 MB 03 - Security Admin Principles.mkv 43.9 MB 04 - Network Design Security.mkv 54.6 MB 05 - Protocols And Ports.mkv 54.4 MB 06 - Wireless Security.mkv 43 MB 07 - Control Types.mkv 37.6 MB 08 - Risk Calculations.mkv 46.5 MB 09 - 3rd Party Integration Risk.mkv 17.2 MB 10 - Strategies To Reduce Risk.mkv 42.2 MB 11 - Forensics.mkv 30.2 MB 12 - Incident Response.mkv 18.1 MB 13 - Security Awareness.mkv 46.7 MB 14 - Physical And Environmental Security.mkv 37.6 MB 15 - Risk Management.mkv 54.4 MB 16 - The Correct Controls For Cia.mkv 58.6 MB 17 - Malware.mkv 46.8 MB 18 - Attack Types.mkv 77 MB 19 - Social Engineering.mkv 37.7 MB 20 - Wireless Attacks.mkv 25.4 MB 21 - Application Attacks.mkv 47.5 MB 22 - Mitigation And Deterrent Techniques.mkv 45.2 MB 23 - Discovery Tools.mkv 55.1 MB 24 - Penetration Testing.mkv 22.9 MB 25 - App. Security Controls And Techniques.mkv 40.4 MB 26 - Security For Mobile.mkv 29.9 MB 27 - Host Security.mkv 39.5 MB 28 - Data Security.mkv 39 MB 29 - Static Environment Security.mkv 22.9 MB 30 - Authentication Services & Protocols.mkv 50.9 MB 31 - Authentication Methods.mkv 50 MB 32 - Authorization Models.mkv 29.3 MB 33 - Account Management.mkv 32.2 MB 34 - Crypto Concepts.mkv 64.6 MB 35 - Cryto Protocols.mkv 62.7 MB 36 - Pki.mkv 43.6 MB 6. Cbt Nuggets - Ec Council Certified Ethical Hacker V8.0 Reconnaissance Overview-1.mkv 23.8 MB