本站已收录 番号和无损神作磁力链接/BT种子 

Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security

种子简介

种子名称: Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security
文件类型: 视频
文件数目: 43个文件
文件大小: 353.9 MB
收录时间: 2017-2-6 05:17
已经下载: 3
资源热度: 148
最近下载: 2024-7-3 00:31

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:49c4038b9166808a6a3e6b8bdd495c1628eb9021&dn=Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security.torrent
  • 01 Application Security Controls and Techniques/01 01 Fuzzing.mp411.95MB
  • 01 Application Security Controls and Techniques/01 02 Kali Linux and Pen Testing Tools.mp46.8MB
  • 01 Application Security Controls and Techniques/01 03 Secure Coding Concepts.mp414.59MB
  • 01 Application Security Controls and Techniques/01 04 Cross Site Scripting (XSS) and Cross Site Request Forgery (XSRF).mp416.88MB
  • 01 Application Security Controls and Techniques/01 05 Application Baseline Configuration and Application Hardening.mp49.63MB
  • 01 Application Security Controls and Techniques/01 06 Multi-tiered Approach and Application Patching.mp47.82MB
  • 01 Application Security Controls and Techniques/01 07 SQL vs. NoSQL Databases.mp412.39MB
  • 01 Application Security Controls and Techniques/01 08 Server-side vs. Client-side Validation.mp44.08MB
  • 02 Mobile Security Concepts and Technologies/02 01 Device Security.mp424.05MB
  • 02 Mobile Security Concepts and Technologies/02 02 Key Credential Management and Authentication.mp49.11MB
  • 02 Mobile Security Concepts and Technologies/02 03 Geo-tagging.mp43.96MB
  • 02 Mobile Security Concepts and Technologies/02 04 Transitive Trusts.mp45.32MB
  • 02 Mobile Security Concepts and Technologies/02 05 BYOD Concerns.mp415.19MB
  • 03 Establishing Host Security/03 01 Module Overview.mp45.73MB
  • 03 Establishing Host Security/03 02 Operating System Security and Settings.mp46.19MB
  • 03 Establishing Host Security/03 03 OS Hardening.mp42.85MB
  • 03 Establishing Host Security/03 04 Patch Management.mp43.14MB
  • 03 Establishing Host Security/03 05 White Listing and Black Listing Applications.mp43.16MB
  • 03 Establishing Host Security/03 06 Trusted OS.mp49.28MB
  • 03 Establishing Host Security/03 07 Host Based Firewalls.mp46.25MB
  • 03 Establishing Host Security/03 08 Host Based Intrusion Detection.mp46.01MB
  • 03 Establishing Host Security/03 09 Hardware Security.mp43.13MB
  • 03 Establishing Host Security/03 10 Host Software Baselining and Virtualization.mp426.28MB
  • 04 Appropriate Controls to Ensure Data Security/04 01 Module Overview.mp42.33MB
  • 04 Appropriate Controls to Ensure Data Security/04 02 Cloud Storage.mp46.07MB
  • 04 Appropriate Controls to Ensure Data Security/04 03 Storage Area Networks (SAN).mp411.56MB
  • 04 Appropriate Controls to Ensure Data Security/04 04 Data Encryption.mp413.66MB
  • 04 Appropriate Controls to Ensure Data Security/04 05 Hardware Based Encryption.mp48.14MB
  • 04 Appropriate Controls to Ensure Data Security/04 06 Types of Data to Secure.mp43.49MB
  • 04 Appropriate Controls to Ensure Data Security/04 07 Permissions _ ACLs.mp41.78MB
  • 04 Appropriate Controls to Ensure Data Security/04 08 Data Policies.mp414.28MB
  • 05 Mitigate Security Risks in Static Environments/05 01 Module Overview.mp43.03MB
  • 05 Mitigate Security Risks in Static Environments/05 02 SCADA Systems.mp422.1MB
  • 05 Mitigate Security Risks in Static Environments/05 03 Embedded Systems, Printers, Smart TVs, and HVAC.mp47.63MB
  • 05 Mitigate Security Risks in Static Environments/05 04 Mobile Operating Systems.mp47.26MB
  • 05 Mitigate Security Risks in Static Environments/05 05 Mainframes.mp44.26MB
  • 05 Mitigate Security Risks in Static Environments/05 06 Game Consoles.mp44.4MB
  • 05 Mitigate Security Risks in Static Environments/05 07 In-vehicle Computing Systems.mp45.2MB
  • 05 Mitigate Security Risks in Static Environments/05 08 Network Segmentation.mp47.37MB
  • 05 Mitigate Security Risks in Static Environments/05 09 Security Layers and Manual Updates.mp47.46MB
  • 05 Mitigate Security Risks in Static Environments/05 10 Firmware Version Control.mp45.53MB
  • 05 Mitigate Security Risks in Static Environments/05 11 Wrappers, Control Redundancy, and Diversity.mp43.82MB
  • 05 Mitigate Security Risks in Static Environments/05 12 Module Review.mp4803.95KB