本站已收录 番号和无损神作磁力链接/BT种子 

LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL

种子简介

种子名称: LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
文件类型: 视频
文件数目: 27个文件
文件大小: 286.92 MB
收录时间: 2017-1-30 10:44
已经下载: 3
资源热度: 79
最近下载: 2024-9-23 05:32

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:310530e1460946a573594bde8e8579b0c31b9e1f&dn=LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL.torrent
  • 01. Introduction/01_01-Welcome.mp46.21MB
  • 01. Introduction/01_02-What you should know.mp41.95MB
  • 02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp413.94MB
  • 02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp413.64MB
  • 02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp412.53MB
  • 02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp412.04MB
  • 02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp49.84MB
  • 02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp48.83MB
  • 02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp47.76MB
  • 03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp412.86MB
  • 03. Cybersecurity Threats/03_02-Dissecting security threats.mp411.04MB
  • 03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp49.46MB
  • 03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp49.37MB
  • 03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp49.34MB
  • 03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp48.61MB
  • 03. Cybersecurity Threats/03_08-Exploring ransomware.mp48.01MB
  • 03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp47.71MB
  • 04. Security Architecture/04_04-Managing user access and identity.mp419.71MB
  • 04. Security Architecture/04_05-Implementing preventative security.mp417.89MB
  • 04. Security Architecture/04_06-Monitoring and alerts.mp414.95MB
  • 04. Security Architecture/04_01-Describing security requirements.mp414.21MB
  • 04. Security Architecture/04_02-Architecting security risk.mp412.86MB
  • 04. Security Architecture/04_03-Selecting security controls.mp48.14MB
  • 05. Incident Management/05_02-Preparing for an incident.mp413.53MB
  • 05. Incident Management/05_03-Responding to an incident.mp410.95MB
  • 05. Incident Management/05_01-Managing incident response.mp48.11MB
  • 06. Conclusion/06_01-Next steps.mp43.44MB