种子简介
种子名称:
Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security
文件类型:
视频
文件数目:
43个文件
文件大小:
353.9 MB
收录时间:
2017-2-6 05:17
已经下载:
3次
资源热度:
177
最近下载:
2024-12-20 18:45
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:49c4038b9166808a6a3e6b8bdd495c1628eb9021&dn=Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Pluralsight - CompTIA Security Plus SY0-401 Application Data and Host Security.torrent
01 Application Security Controls and Techniques/01 01 Fuzzing.mp411.95MB
01 Application Security Controls and Techniques/01 02 Kali Linux and Pen Testing Tools.mp46.8MB
01 Application Security Controls and Techniques/01 03 Secure Coding Concepts.mp414.59MB
01 Application Security Controls and Techniques/01 04 Cross Site Scripting (XSS) and Cross Site Request Forgery (XSRF).mp416.88MB
01 Application Security Controls and Techniques/01 05 Application Baseline Configuration and Application Hardening.mp49.63MB
01 Application Security Controls and Techniques/01 06 Multi-tiered Approach and Application Patching.mp47.82MB
01 Application Security Controls and Techniques/01 07 SQL vs. NoSQL Databases.mp412.39MB
01 Application Security Controls and Techniques/01 08 Server-side vs. Client-side Validation.mp44.08MB
02 Mobile Security Concepts and Technologies/02 01 Device Security.mp424.05MB
02 Mobile Security Concepts and Technologies/02 02 Key Credential Management and Authentication.mp49.11MB
02 Mobile Security Concepts and Technologies/02 03 Geo-tagging.mp43.96MB
02 Mobile Security Concepts and Technologies/02 04 Transitive Trusts.mp45.32MB
02 Mobile Security Concepts and Technologies/02 05 BYOD Concerns.mp415.19MB
03 Establishing Host Security/03 01 Module Overview.mp45.73MB
03 Establishing Host Security/03 02 Operating System Security and Settings.mp46.19MB
03 Establishing Host Security/03 03 OS Hardening.mp42.85MB
03 Establishing Host Security/03 04 Patch Management.mp43.14MB
03 Establishing Host Security/03 05 White Listing and Black Listing Applications.mp43.16MB
03 Establishing Host Security/03 06 Trusted OS.mp49.28MB
03 Establishing Host Security/03 07 Host Based Firewalls.mp46.25MB
03 Establishing Host Security/03 08 Host Based Intrusion Detection.mp46.01MB
03 Establishing Host Security/03 09 Hardware Security.mp43.13MB
03 Establishing Host Security/03 10 Host Software Baselining and Virtualization.mp426.28MB
04 Appropriate Controls to Ensure Data Security/04 01 Module Overview.mp42.33MB
04 Appropriate Controls to Ensure Data Security/04 02 Cloud Storage.mp46.07MB
04 Appropriate Controls to Ensure Data Security/04 03 Storage Area Networks (SAN).mp411.56MB
04 Appropriate Controls to Ensure Data Security/04 04 Data Encryption.mp413.66MB
04 Appropriate Controls to Ensure Data Security/04 05 Hardware Based Encryption.mp48.14MB
04 Appropriate Controls to Ensure Data Security/04 06 Types of Data to Secure.mp43.49MB
04 Appropriate Controls to Ensure Data Security/04 07 Permissions _ ACLs.mp41.78MB
04 Appropriate Controls to Ensure Data Security/04 08 Data Policies.mp414.28MB
05 Mitigate Security Risks in Static Environments/05 01 Module Overview.mp43.03MB
05 Mitigate Security Risks in Static Environments/05 02 SCADA Systems.mp422.1MB
05 Mitigate Security Risks in Static Environments/05 03 Embedded Systems, Printers, Smart TVs, and HVAC.mp47.63MB
05 Mitigate Security Risks in Static Environments/05 04 Mobile Operating Systems.mp47.26MB
05 Mitigate Security Risks in Static Environments/05 05 Mainframes.mp44.26MB
05 Mitigate Security Risks in Static Environments/05 06 Game Consoles.mp44.4MB
05 Mitigate Security Risks in Static Environments/05 07 In-vehicle Computing Systems.mp45.2MB
05 Mitigate Security Risks in Static Environments/05 08 Network Segmentation.mp47.37MB
05 Mitigate Security Risks in Static Environments/05 09 Security Layers and Manual Updates.mp47.46MB
05 Mitigate Security Risks in Static Environments/05 10 Firmware Version Control.mp45.53MB
05 Mitigate Security Risks in Static Environments/05 11 Wrappers, Control Redundancy, and Diversity.mp43.82MB
05 Mitigate Security Risks in Static Environments/05 12 Module Review.mp4803.95KB