13. Windows Security/1. Windows Security - what you’ll learn.srt 1.4 kB
16. Defence in Depth/15. Law #7.srt 1.4 kB
9. Network administration/1. Introduction to Monitoring Transmitted Data.srt 1.3 kB
4. Popular IT Security Myths/4. Myths #3 - IT security is always a priority.srt 1.3 kB
18. Application Security - Configuration and Management/1. Here’s what you’ll learn in this module.srt 1.2 kB
16. Defence in Depth/18. Law #10.srt 791 Bytes
2. Application Security/1. Why is this section here.html 380 Bytes
24. BONUS Section/3. Thanks for joining.html 374 Bytes
1. Let's start!/1. Welcome to the course.html 334 Bytes
2. Application Security/13. Check your knowledge and get ready for the exam.html 167 Bytes
21. Prepare for the examination/1. Answer sample questions which you can find during the examination.html 166 Bytes
2. Application Security/4.1 Kali Linux Download - your training environment.html 146 Bytes
0. Websites you may like/[FCS Forum].url 133 Bytes
0. Websites you may like/[FreeCourseSite.com].url 127 Bytes
0. Websites you may like/[CourseClub.ME].url 122 Bytes
15. Risk Management/12. Risk Assessment - notes for the examination.html 10 Bytes
15. Risk Management/20. Social Engineering and Rogue Software - notes for the examination.html 10 Bytes
15. Risk Management/7. Attack Methodologies - notes for the examination.html 10 Bytes
16. Defence in Depth/20. Immutable Laws of Security - notes for the examination.html 10 Bytes
16. Defence in Depth/8. The Defence in Depth Model - notes for the examination.html 10 Bytes
17. Disaster Recovery/11. How to reduce losses - notes for the examination.html 10 Bytes
18. Application Security - Configuration and Management/10. How to protect users without interrupting their work - notes for the examination.html 10 Bytes
19. Cryptography/17. Symmetric and Asymmetric Ciphers - notes for the examination.html 10 Bytes
2. Application Security/12. Program Security Assessment - notes for the examination.html 10 Bytes
2. Application Security/9. Application Attacks - notes for the examination.html 10 Bytes
20. Public Key Infrastructure/10. Public Key Infrastructure - Trust but verify - notes for the examination.html 10 Bytes
20. Public Key Infrastructure/9. Threat Modelling and Classification - notes for the examination.html 10 Bytes