Урок #1 1-comptia-security-certification-bootcamp-zero-to-mastery-academy-1920x1080-2866k
3:00
Урок #2 2-introduction-zero-to-mastery-academy-1920x1080-737k
2:04
Урок #3 3-what-is-security-_-zero-to-mastery-academy-1920x1080-722k
5:14
Урок #4 4-how-to-succeed-zero-to-mastery-academy-1920x1080-890k
4:21
Урок #5 5-security-basics-and-cia-triangle-zero-to-mastery-academy-1920x1080-726k
8:39
Урок #6 6-the-power-of-control-different-types-of-control-zero-to-mastery-academy-1920x1080-706k
13:26
Урок #7 7-different-types-of-identity-identification-zero-to-mastery-academy-1920x1080-832k
3:46
Урок #8 8-account-access-control-and-privilege-management-zero-to-mastery-academy-1920x1080-759k
7:28
Урок #9 9-file-access-control-windows-linux-zero-to-mastery-academy-1920x1080-462k
6:23
Урок #10 10-aaa-servers-zero-to-mastery-academy-1920x1080-797k
7:18
Урок #11 11-different-types-of-authentication-and-authentication-management-zero-to-mastery-academy-1920x1080-774k
11:33
Урок #12 12-different-existing-authentication-and-authorization-mechanisms-zero-to-mastery-academy-1920x1080-739k
12:57
Урок #13 13-account-control-practices-and-policies-zero-to-mastery-academy-1920x1080-752k
10:16
Урок #14 14-osi-model-zero-to-mastery-academy-1920x1080-755k
3:57
Урок #15 15-honeypots-proxy-servers-jump-servers-load-balancers-zero-to-mastery-academy-1920x1080-762k
10:19
Урок #16 16-routers-switches-acl-loop-protection-zero-to-mastery-academy-1920x1080-821k
5:10
Урок #17 17-firewalls-zero-to-mastery-academy-1920x1080-838k
5:49
Урок #18 18-network-segmentation-zero-to-mastery-academy-1920x1080-866k
6:28
Урок #19 19-ids-ips-nac-zero-to-mastery-academy-1920x1080-793k
7:57
Урок #20 20-dns-dns-security-zero-to-mastery-academy-1920x1080-781k
6:32
Урок #21 21-ip-addresses-zero-to-mastery-academy-1920x1080-780k
5:32
Урок #22 22-dynamic-host-configuration-protocol-dhcp-zero-to-mastery-academy-1920x1080-715k
3:31
Урок #23 23-virtual-private-network-vpn-zero-to-mastery-academy-1920x1080-768k
9:05
Урок #24 24-networking-tools-commands-zero-to-mastery-academy-1920x1080-417k
22:12
Урок #25 25-file-manipulation-tools-commands-zero-to-mastery-academy-1920x1080-254k
8:53
Урок #26 26-forensic-tools-commands-zero-to-mastery-academy-1920x1080-678k
5:14
Урок #27 27-transmission-control-protocol-tcp-and-user-datagram-protocol-udp-zero-to-mastery-academy-1920x1080-755k
3:29
Урок #28 28-unsecure-protocols-zero-to-mastery-academy-1920x1080-777k
7:15
Урок #29 29-secure-protocols-zero-to-mastery-academy-1920x1080-805k
5:07
Урок #30 30-wireless-infrastructure-zero-to-mastery-academy-1920x1080-756k
9:28
Урок #31 31-wireless-encryption-and-threats-zero-to-mastery-academy-1920x1080-809k
8:18
Урок #32 32-wireless-authentication-protocols-zero-to-mastery-academy-1920x1080-798k
2:18
Урок #33 33-mobile-device-connection-and-communication-methods-zero-to-mastery-academy-1920x1080-908k
3:43
Урок #34 34-mobile-device-management-zero-to-mastery-academy-1920x1080-779k
7:24
Урок #35 35-mobile-device-monitoring-and-protection-zero-to-mastery-academy-1920x1080-773k
7:29
Урок #36 36-virtualization-theory-zero-to-mastery-academy-1920x1080-769k
6:59
Урок #37 37-virtual-box-demonstration-zero-to-mastery-academy-1920x1080-420k
4:45
Урок #38 38-cloud-technology-zero-to-mastery-academy-1920x1080-775k
6:02
Урок #39 39-cloud-services-zero-to-mastery-academy-1920x1080-836k
7:06
Урок #40 40-storing-data-in-cloud-and-cloud-security-zero-to-mastery-academy-1920x1080-809k
7:56
Урок #41 41-physical-security-zero-to-mastery-academy-1920x1080-725k
6:40
Урок #42 42-what-is-penetration-testing_-zero-to-mastery-academy-1920x1080-783k
5:18
Урок #43 43-different-phases-of-a-penetration-test-zero-to-mastery-academy-1920x1080-779k
7:12
Урок #44 44-different-teams-in-cyber-security-zero-to-mastery-academy-1920x1080-898k
2:38
Урок #45 45-vulnerabilities-zero-to-mastery-academy-1920x1080-788k
5:43
Урок #46 46-monitoring-zero-to-mastery-academy-1920x1080-839k
5:17
Урок #47 47-exercise-imposter-syndrome-zero-to-mastery-academy-1920x1080-887k
2:56
Урок #48 48-different-types-of-attackers-zero-to-mastery-academy-1920x1080-794k
5:15
Урок #49 49-different-types-of-malware-zero-to-mastery-academy-1920x1080-815k
8:08
Урок #50 50-social-engineering-phishing-zero-to-mastery-academy-1920x1080-868k
8:25
Урок #51 51-network-attacks-zero-to-mastery-academy-1920x1080-809k
7:25
Урок #52 52-physical-attacks-zero-to-mastery-academy-1920x1080-822k
4:01
Урок #53 53-password-attacks-zero-to-mastery-academy-1920x1080-773k
7:08
Урок #54 54-overflow-attacks-pointer-dereference-error-handling-zero-to-mastery-academy-1920x1080-831k
6:49
Урок #55 55-application-attacks-injection-attacks-zero-to-mastery-academy-1920x1080-824k
8:43
Урок #56 56-zero-days-and-weak-configurations-zero-to-mastery-academy-1920x1080-772k
4:18
Урок #57 57-hijacking-attacks-zero-to-mastery-academy-1920x1080-771k
2:59
Урок #58 58-cryptographic-attacks-zero-to-mastery-academy-1920x1080-810k
2:44
Урок #59 59-third-party-attacks-zero-to-mastery-academy-1920x1080-799k
4:11
Урок #60 60-host-security-boot-zero-to-mastery-academy-1920x1080-809k
3:02
Урок #61 61-endpoint-protection-strategy-zero-to-mastery-academy-1920x1080-783k
8:13
Урок #62 62-system-hardening-zero-to-mastery-academy-1920x1080-786k
2:44
Урок #63 63-inbuilt-devices-and-specialized-devices-zero-to-mastery-academy-1920x1080-792k
9:28
Урок #64 64-secure-application-development-and-secure-coding-zero-to-mastery-academy-1920x1080-849k
10:48
Урок #65 65-concept-of-risk-and-risk-types-zero-to-mastery-academy-1920x1080-817k
6:14
Урок #66 66-risk-control-and-analysis-zero-to-mastery-academy-1920x1080-783k
8:04
Урок #67 67-business-impact-analysis-zero-to-mastery-academy-1920x1080-791k
6:37
Урок #68 68-security-information-groups-and-sources-zero-to-mastery-academy-1920x1080-839k
5:39
Урок #69 69-facility-policies-and-rules-zero-to-mastery-academy-1920x1080-872k
6:18
Урок #70 70-laws-and-standards-zero-to-mastery-academy-1920x1080-950k
5:24
Урок #71 71-data-handling-zero-to-mastery-academy-1920x1080-810k
7:32
Урок #72 72-incident-response-and-recovery-practices-zero-to-mastery-academy-1920x1080-776k
11:31
Урок #73 73-information-gathering-for-incident-response-zero-to-mastery-academy-1920x1080-793k
8:02
Урок #74 74-controls-and-techniques-for-lowering-risk-zero-to-mastery-academy-1920x1080-809k
5:41
Урок #75 75-redundancy-and-tolerance-zero-to-mastery-academy-1920x1080-825k
10:07
Урок #76 76-symmetric-and-asymmetric-encryption-zero-to-mastery-academy-1920x1080-880k
7:28
Урок #77 77-concept-of-public-key-infrastructure-zero-to-mastery-academy-1920x1080-876k
8:47
Урок #78 78-important-cryptographic-terms-and-concepts-zero-to-mastery-academy-1920x1080-834k
9:00
Урок #79 79-thank-you-zero-to-mastery-academy-1920x1080-997k
1:18
Array
(
[bitrate] => 2217187
[filesize] => 52929347
[mime_type] => video/mp4
[length] => 180
[length_formatted] => 3:00
[width] => 1920
[height] => 1080
[fileformat] => mp4
[dataformat] => quicktime
[audio] => Array
(
[dataformat] => mp4
[bitrate] => 128010
[codec] => ISO/IEC 14496-3 AAC
[sample_rate] => 48000
[channels] => 2
[bits_per_sample] => 16
[lossless] =>
[channelmode] => stereo
[compression_ratio] => 0.08333984375
)
[created_timestamp] => -2082844800
)