本站已收录 番号和无损神作磁力链接/BT种子 

Lynda - Cybersecurity Foundations

种子简介

种子名称: Lynda - Cybersecurity Foundations
文件类型: 视频
文件数目: 27个文件
文件大小: 287.12 MB
收录时间: 2017-9-19 22:58
已经下载: 3
资源热度: 94
最近下载: 2024-9-19 01:02

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:2698265e4ba9ae63e7acbe8fccb6dc4d7466d999&dn=Lynda - Cybersecurity Foundations 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Lynda - Cybersecurity Foundations.torrent
  • 00. Introduction/00_01 - Welcome.mp45.51MB
  • 00. Introduction/00_02 - What you should know.mp41.91MB
  • 01. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp412.2MB
  • 01. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp412.7MB
  • 01. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp410.05MB
  • 01. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp47.82MB
  • 01. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp413.95MB
  • 01. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp414.04MB
  • 01. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp48.94MB
  • 02. Cybersecurity Threats/02_01 - Breaking down the cybersecurity kill chain.mp47.8MB
  • 02. Cybersecurity Threats/02_02 - Dissecting security threats.mp411.17MB
  • 02. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp49.63MB
  • 02. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp48.56MB
  • 02. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp49.26MB
  • 02. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp49.37MB
  • 02. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp412.85MB
  • 02. Cybersecurity Threats/02_08 - Exploring ransomware.mp48MB
  • 03. Security Architecture/03_01 - Describing security requirements.mp414.26MB
  • 03. Security Architecture/03_02 - Architecting security risk.mp412.79MB
  • 03. Security Architecture/03_03 - Selecting security controls.mp48.12MB
  • 03. Security Architecture/03_04 - Managing user access and identity.mp419.65MB
  • 03. Security Architecture/03_05 - Implementing preventative security.mp418.01MB
  • 03. Security Architecture/03_06 - Monitoring and alerts.mp415MB
  • 04. Incident Management/04_01 - Managing incident response.mp48.11MB
  • 04. Incident Management/04_02 - Preparing for an incident.mp412.93MB
  • 04. Incident Management/04_03 - Responding to an incident.mp411.11MB
  • 04. Incident Management/05_01 - Next steps.mp43.36MB