本站已收录 番号和无损神作磁力链接/BT种子 

CISSP.Complete.Video.Course.2nd.Edition

种子简介

种子名称: CISSP.Complete.Video.Course.2nd.Edition
文件类型: 视频
文件数目: 198个文件
文件大小: 10.94 GB
收录时间: 2019-4-30 21:43
已经下载: 3
资源热度: 227
最近下载: 2024-11-27 01:34

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:4d3ab332ae75166900561f841c5550c0f6e6db4b&dn=CISSP.Complete.Video.Course.2nd.Edition 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

CISSP.Complete.Video.Course.2nd.Edition.torrent
  • 001 CISSP - Introduction.mp450.83MB
  • 002 Module introduction.mp49.79MB
  • 003 Learning objectives.mp42.51MB
  • 004 1.1 Information Security Fundamentals.mp4115.3MB
  • 005 Learning objectives.mp42.84MB
  • 006 2.1 Frameworks, Benchmarks, and Guidelines.mp4123.27MB
  • 007 2.2 Leadership Roles and Responsibilities.mp4189.64MB
  • 008 Learning objectives.mp42.78MB
  • 009 3.1 Regulatory and Contractual Obligations.mp494.37MB
  • 010 3.2 Privacy and Data Protection.mp480.4MB
  • 011 Learning objectives.mp44.57MB
  • 012 4.1 Cybercrime and Data Breaches.mp495.83MB
  • 013 4.2 Licensing and Intellectual Property Law.mp481.41MB
  • 014 Lesson 1-4 Assessment.mp470.12MB
  • 015 Learning objectives.mp42.61MB
  • 016 5.1 Organizational and Professional Ethics.mp444.07MB
  • 017 Learning objectives.mp42.95MB
  • 018 6.1 Information Security Policy.mp488.13MB
  • 019 Learning objectives.mp43.14MB
  • 020 7.1 Business Continuity Planning.mp459.79MB
  • 021 7.2 Business Impact Analysis.mp488.22MB
  • 022 Learning objectives.mp43.02MB
  • 023 8.1 Personnel Policies and Agreements.mp4125.24MB
  • 024 Lesson 5-8 Assessment.mp462.12MB
  • 025 Learning objectives.mp43.37MB
  • 026 9.1 Risk Management Concepts.mp4123.96MB
  • 027 9.2 Risk Assessment.mp4112.19MB
  • 028 9.3 Countermeasure Selection.mp4105.31MB
  • 029 Learning objectives.mp42.52MB
  • 030 10.1 Threat Modeling.mp483.13MB
  • 031 10.2 Attack Vectors.mp4109.76MB
  • 032 Learning objectives.mp42.23MB
  • 033 11.1 Supply Chain Risk Management.mp478.55MB
  • 034 Learning objectives.mp44.29MB
  • 035 12.1 SETA Principles and Practices.mp492.27MB
  • 036 12.2 Social Engineering Training.mp48.59MB
  • 037 Lesson 9-12 Assessment.mp467.41MB
  • 038 Module introduction.mp46.72MB
  • 039 Learning objectives.mp42.14MB
  • 040 13.1 Classification Frameworks.mp4104.88MB
  • 041 Learning objectives.mp42.19MB
  • 042 14.1 Asset Ownership and Management.mp4109.95MB
  • 043 Learning objectives.mp41.9MB
  • 044 15.1 Privacy Principles.mp4112.45MB
  • 045 Learning objectives.mp42.27MB
  • 046 16.1 Data Retention and Destruction.mp4133.94MB
  • 047 Learning objectives.mp42.32MB
  • 048 17.1 Data Security Standards and Selection.mp472.07MB
  • 049 Learning objectives.mp43.74MB
  • 050 18.1 Labeling and Handling Standards.mp489.49MB
  • 051 Lesson 13-18 Assessment.mp456.75MB
  • 052 Module introduction.mp410.83MB
  • 053 Learning objectives.mp42.32MB
  • 054 19.1 Security Design Principles.mp472.62MB
  • 055 Learning objectives.mp42.22MB
  • 056 20.1 Information Security Models.mp493.93MB
  • 057 Learning objectives.mp42.2MB
  • 058 21.1 Security Evaluation Models.mp468.93MB
  • 059 Learning objectives.mp43.45MB
  • 060 22.1 Information Systems Security Capabilities.mp470.22MB
  • 061 Lesson 19-22 Assessment.mp458.21MB
  • 062 Learning objectives.mp43.39MB
  • 063 23.1 Traditional Computing Environments.mp462.32MB
  • 064 23.2 Cloud Computing.mp4107.76MB
  • 065 Learning objectives.mp42.08MB
  • 066 24.1 Web Vulnerabilities.mp495.27MB
  • 067 Learning objectives.mp42.23MB
  • 068 25.1 Mobile Systems Vulnerabilities.mp481.96MB
  • 069 Learning objectives.mp43.13MB
  • 070 26.1 Embedded Systems Vulnerabilities.mp476.16MB
  • 071 Lesson 23-26 Assessment.mp460.17MB
  • 072 Learning objectives.mp45.37MB
  • 073 27.1 Cryptographic Fundamentals.mp495.31MB
  • 074 27.2 Symmetric Encryption.mp487.85MB
  • 075 27.3 Asymmetric Encryption.mp494.78MB
  • 076 27.4 Hashing and Digital Signatures.mp497.56MB
  • 077 27.5 PKI and Digital Certificates.mp4106.11MB
  • 078 27.6 Cryptographic Attacks and Vulnerabilities.mp479.32MB
  • 079 Learning objectives.mp42.16MB
  • 080 28.1 Physical Security Principles.mp476.15MB
  • 081 Learning objectives.mp44.19MB
  • 082 29.1 Site and Facility Security Controls.mp4105MB
  • 083 29.2 Environmental Issues and Controls.mp482.48MB
  • 084 Lesson 27-29 Assessment.mp460.88MB
  • 085 Module introduction.mp47.6MB
  • 086 Learning objectives.mp43.43MB
  • 087 30.1 Network Models and IP Convergence.mp4111.14MB
  • 088 30.2 Non-IP Multilayer Protocols.mp441.7MB
  • 089 30.3 Wireless Networks.mp4115.57MB
  • 090 Learning objectives.mp42.86MB
  • 091 31.1 Transmission and Connectivity.mp4143.87MB
  • 092 31.2 Network Access Control Devices.mp4112.15MB
  • 093 31.3 Endpoint Security.mp472.55MB
  • 094 Learning objectives.mp45.99MB
  • 095 32.1 Voice and Multimedia.mp4103.09MB
  • 096 32.2 Remote Access.mp4107.36MB
  • 097 32.3 Data Communications.mp4112.82MB
  • 098 32.4 Virtualization and Software-defined Networks.mp497.24MB
  • 099 Lesson 30-32 Assessment.mp484.01MB
  • 100 Module introduction.mp47.39MB
  • 101 Learning objectives.mp42.29MB
  • 102 33.1 Access Control Fundamentals.mp4111.34MB
  • 103 Learning objectives.mp43.64MB
  • 104 34.1 Identification and Authentication.mp4142.49MB
  • 105 34.2 Identity and Access Services.mp4120MB
  • 106 Learning objectives.mp42.31MB
  • 107 35.1 Identity Management (IdM).mp4113.17MB
  • 108 Learning objectives.mp42.26MB
  • 109 36.1 Access Control Models.mp489.46MB
  • 110 Learning objectives.mp43.86MB
  • 111 37.1 Identity and Access Management (IAM).mp494.52MB
  • 112 Lesson 33-37 Assessment.mp486.46MB
  • 113 Module introduction.mp47.57MB
  • 114 Learning objectives.mp42.79MB
  • 115 38.1 Assessment and Testing Overview.mp480.55MB
  • 116 38.2 Planning Engagements.mp4101.7MB
  • 117 Learning objectives.mp42.45MB
  • 118 39.1 Infrastructure Assessments.mp4142.57MB
  • 119 39.2 Code Testing and Analysis.mp461.82MB
  • 120 Learning objectives.mp42.74MB
  • 121 40.1 Activity and Error Reporting.mp470.02MB
  • 122 40.2 Information Security Continuous Monitoring.mp479.6MB
  • 123 Learning objectives.mp42.51MB
  • 124 41.1 Metrics, KPIs, and Business Intelligence.mp443.54MB
  • 125 Learning objectives.mp43.64MB
  • 126 42.1 Managing Third-party Audits and Examinations.mp4106.65MB
  • 127 Lesson 38-42 Assessment.mp485.74MB
  • 128 Module introduction.mp411.17MB
  • 129 Learning objectives.mp42.73MB
  • 130 43.1 Evidence Handling.mp475.73MB
  • 131 43.2 Forensic Investigative Techniques.mp4124.25MB
  • 132 Learning objectives.mp42.51MB
  • 133 44.1 Investigation Objectives and Requirements.mp459.4MB
  • 134 Learning objectives.mp42.96MB
  • 135 45.1 Logging and Analysis.mp4108.72MB
  • 136 Lesson 43-45 Assessment.mp490.24MB
  • 137 Learning objectives.mp42.03MB
  • 138 46.1 Configuration Management.mp441.92MB
  • 139 Learning objectives.mp42.33MB
  • 140 47.1 Security Operations.mp4105.74MB
  • 141 Learning objectives.mp42.76MB
  • 142 48.1 Media Management.mp4110.74MB
  • 143 48.2 Mobile Device Management.mp4115.01MB
  • 144 Learning objectives.mp43.14MB
  • 145 49.1 Incident Management Planning.mp4108.06MB
  • 146 49.2 Incident Response.mp493.03MB
  • 147 Lesson 46-49 Assessment.mp4116.28MB
  • 148 Learning objectives.mp44.34MB
  • 149 50.1 Detective and Preventative Solutions.mp475.69MB
  • 150 50.2 Firewalls and Filters.mp4116.16MB
  • 151 50.3 IDS_IPS.mp480.09MB
  • 152 50.4 Anti-Malware Techniques.mp457.16MB
  • 153 Learning objectives.mp43.69MB
  • 154 51.1 Vulnerability Management.mp4101.29MB
  • 155 51.2 Patch Management.mp468.99MB
  • 156 51.3 Threat Intelligence and Information Sharing.mp471.84MB
  • 157 Learning objectives.mp42.24MB
  • 158 52.1 Change Management.mp465.71MB
  • 159 Learning objectives.mp44.38MB
  • 160 53.1 Site Recovery Strategies.mp479.24MB
  • 161 53.2 Data Backup and Restoration.mp4109.74MB
  • 162 53.3 Resiliency and Fault Tolerance.mp495.45MB
  • 163 Lesson 50-53 Assessment.mp4149.82MB
  • 164 Learning objectives.mp42.38MB
  • 165 54.1 DR Planning and Response.mp4104.9MB
  • 166 Learning objectives.mp42.33MB
  • 167 55.1 DRP Training and Testing.mp462.47MB
  • 168 Learning objectives.mp42.64MB
  • 169 56.1 BCP Relationship.mp483.4MB
  • 170 Learning objectives.mp42.51MB
  • 171 57.1 Perimeter and Internal Security Controls.mp4116.15MB
  • 172 Learning objectives.mp43.75MB
  • 173 58.1 Personnel and Workplace Safety.mp449.77MB
  • 174 Lesson 54-58 Assessment.mp4135.73MB
  • 175 Module introduction.mp47.74MB
  • 176 Learning objectives.mp42.92MB
  • 177 59.1 Software Development Life Cycle.mp4116.79MB
  • 178 59.2 Secure DevOps.mp475.36MB
  • 179 Learning objectives.mp42.45MB
  • 180 60.1 Staging and Deployment Strategies.mp493.26MB
  • 181 Learning objectives.mp42.51MB
  • 182 61.1 Assessing the Effectiveness of Software Security.mp493.95MB
  • 183 61.1 Assessing the Effectiveness of Software Security.mp493.95MB
  • 184 Learning objectives.mp42.47MB
  • 185 62.1 Software Procurement and Acquisition.mp4112.14MB
  • 186 Learning objectives.mp44.51MB
  • 187 63.1 Source Code Weaknesses.mp4100.01MB
  • 188 63.2 Secure Coding Techniques.mp487.24MB
  • 189 Lesson 59-63 Assessment.mp4107.39MB
  • 190 Module introduction.mp44.36MB
  • 191 Learning objectives.mp42.33MB
  • 192 64.1 Understanding the Exam Structure.mp412.65MB
  • 193 64.2 Test Taking Strategies.mp427.08MB
  • 194 64.3 Preparing for Test Day.mp414.03MB
  • 195 Learning objectives.mp42.65MB
  • 196 65.1 What to Expect at the Testing Center.mp423.28MB
  • 197 65.2 Attaining and Maintaining Your CISSP Certification.mp410.68MB
  • 198 CISSP - Summary.mp46.36MB