本站已收录 番号和无损神作磁力链接/BT种子 

[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU]

种子简介

种子名称: [FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU]
文件类型: 视频
文件数目: 63个文件
文件大小: 2.03 GB
收录时间: 2019-2-12 00:47
已经下载: 3
资源热度: 127
最近下载: 2024-5-31 18:53

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:45f66083539e6b153e221895f0ec7c1139ac83b2&dn=[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU] 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[FreeTutorials.Eu] [UDEMY] Cyber Security and Information Security Fundamentals - [FTU].torrent
  • 1. Introduction/10. Compliance and Ethics.mp421.25MB
  • 1. Introduction/11. Industry Specific Laws.mp431.52MB
  • 1. Introduction/12. Computer Crimes.mp417.76MB
  • 1. Introduction/13. Software Licensing.mp423.96MB
  • 1. Introduction/14. Data Breaches and Ethics.mp415.68MB
  • 1. Introduction/15. Security Policy Framework.mp418.31MB
  • 1. Introduction/16. Common Policies and Key Principles.mp427.13MB
  • 1. Introduction/17. Business Continuity Planning.mp413.56MB
  • 1. Introduction/18. Business Continuity Controls and Key Technical Concepts.mp428.66MB
  • 1. Introduction/19. RAID Technology.mp423.88MB
  • 1. Introduction/1. Introduction.mp433.25MB
  • 1. Introduction/20. Risk Management.mp422.69MB
  • 1. Introduction/21. Risk Assessment Techniques.mp423.23MB
  • 1. Introduction/22. Quantitative Risk Factors.mp431.42MB
  • 1. Introduction/23. Risk Management Strategies.mp425.61MB
  • 1. Introduction/24. Security Controls.mp423.69MB
  • 1. Introduction/25. Understanding Data Security.mp419.46MB
  • 1. Introduction/26. Data Security Policies.mp426.04MB
  • 1. Introduction/27. Data Security Roles.mp418.84MB
  • 1. Introduction/28. Data Privacy.mp430.52MB
  • 1. Introduction/29. Developing Security Baselines.mp422.82MB
  • 1. Introduction/2. Understanding Information Security.mp426.06MB
  • 1. Introduction/30. Leveraging Industry Standards.mp445.8MB
  • 1. Introduction/31. Customizing Security Standards.mp422.93MB
  • 1. Introduction/32. Understanding Encryption.mp428.65MB
  • 1. Introduction/33. Secure Design Principles.mp456.29MB
  • 1. Introduction/34. Security Models.mp443.98MB
  • 1. Introduction/35. Security Requirements.mp474.68MB
  • 1. Introduction/36. Virtualization.mp463.48MB
  • 1. Introduction/37. Cloud Computing Models.mp448.98MB
  • 1. Introduction/38. Public Cloud Tiers.mp456.3MB
  • 1. Introduction/39. Memory Protection.mp462.11MB
  • 1. Introduction/3. Hashing.mp432.85MB
  • 1. Introduction/40. Interface Protection.mp485.17MB
  • 1. Introduction/41. High Availability and Fault Tolerance.mp447.99MB
  • 1. Introduction/42. OWASP Top 10.mp440.41MB
  • 1. Introduction/43. SQL Injection Prevention.mp426.83MB
  • 1. Introduction/44. Cross-Site Scripting Prevention.mp431.69MB
  • 1. Introduction/45. Cross-Site Request Forgery.mp421.49MB
  • 1. Introduction/46. Understanding Encryption.mp428.66MB
  • 1. Introduction/47. Symmetric and Asymmetric Cryptography.mp447.79MB
  • 1. Introduction/48. Cryptography Goals.mp415.95MB
  • 1. Introduction/49. Codes and Ciphers.mp423.21MB
  • 1. Introduction/4. Digital Signatures and Digital Certificates.mp418.63MB
  • 1. Introduction/50. Key Lifecycle Management.mp481.71MB
  • 1. Introduction/51. Data Encryption Standards (DES).mp424.69MB
  • 1. Introduction/52. Triple DES (3DES).mp432.28MB
  • 1. Introduction/53. AES, Blowfish, and Twofish.mp461.15MB
  • 1. Introduction/54. RC4.mp417.86MB
  • 1. Introduction/55. RSA Encryption.mp460.9MB
  • 1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.mp423.03MB
  • 1. Introduction/57. Key Exchange.mp422.75MB
  • 1. Introduction/58. Diffie-Hellman Key Exchange.mp454.29MB
  • 1. Introduction/59. Key Escrow.mp442.91MB
  • 1. Introduction/5. Availability.mp418.86MB
  • 1. Introduction/60. Trust Models.mp422.76MB
  • 1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.mp439.24MB
  • 1. Introduction/62. Hash Functions.mp432.84MB
  • 1. Introduction/63. Digital Signatures and Digital Certificates.mp418.65MB
  • 1. Introduction/6. Security Governance.mp415.81MB
  • 1. Introduction/7. Organizational Processes.mp418.01MB
  • 1. Introduction/8. Security Roles and Responsibilities.mp414.68MB
  • 1. Introduction/9. Control Frameworks.mp432.17MB