本站已收录 番号和无损神作磁力链接/BT种子 

CISSP® - Security Operations

种子简介

种子名称: CISSP® - Security Operations
文件类型: 视频
文件数目: 59个文件
文件大小: 262.57 MB
收录时间: 2018-2-2 14:57
已经下载: 3
资源热度: 182
最近下载: 2024-11-24 20:35

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:7ed8695e4fc12fd145f56c8465eb81487c19b563&dn=CISSP® - Security Operations 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

CISSP® - Security Operations.torrent
  • 1. Course Overview/01. Course Overview.mp43.43MB
  • 10. Evidence Handling/31. Introduction.mp41.06MB
  • 10. Evidence Handling/32. Rules of Evidence.mp43.85MB
  • 10. Evidence Handling/33. Conclusion.mp4743.03KB
  • 11. Resource Provisioning/34. Introduction.mp41.19MB
  • 11. Resource Provisioning/35. Provisioning Assets.mp48.61MB
  • 11. Resource Provisioning/36. Conclusion.mp41.23MB
  • 12. Recovery Strategies/37. Introduction.mp41.23MB
  • 12. Recovery Strategies/38. Recovery Strategies.mp49.04MB
  • 12. Recovery Strategies/39. Conclusion.mp4724.4KB
  • 13. Personnel Privacy and Safety/40. Introduction.mp4738.49KB
  • 13. Personnel Privacy and Safety/41. Privacy.mp46.38MB
  • 13. Personnel Privacy and Safety/42. Safety Matters.mp412.24MB
  • 13. Personnel Privacy and Safety/43. Conclusion.mp41.44MB
  • 14. Business Continuity and Disaster Recovery/44. Introduction.mp41.29MB
  • 14. Business Continuity and Disaster Recovery/45. Disaster Recovery and Business Continuity.mp49.25MB
  • 14. Business Continuity and Disaster Recovery/46. Conclusion.mp41.51MB
  • 15. Internal Physical Security/47. Introduction.mp41.08MB
  • 15. Internal Physical Security/48. Alarms, Access Cards, Biometrics, and Locks.mp416.24MB
  • 15. Internal Physical Security/49. Key Controls.mp42.7MB
  • 15. Internal Physical Security/50. Mantraps, Safes, Vaults, and Turnstiles.mp45.05MB
  • 15. Internal Physical Security/51. Conclusion.mp4694.45KB
  • 16. Securing Assets/52. Introduction.mp4910.48KB
  • 16. Securing Assets/53. Protecting Security Equipment.mp47.71MB
  • 16. Securing Assets/54. Conclusion.mp4874.07KB
  • 17. External Physical Security/55. Introduction.mp41.33MB
  • 17. External Physical Security/56. Barriers.mp418.81MB
  • 17. External Physical Security/57. Lighting.mp49.12MB
  • 17. External Physical Security/58. Closed Circuit Television.mp42.9MB
  • 17. External Physical Security/59. Conclusion.mp4830.81KB
  • 2. Introduction to Security Operations/02. Introduction.mp42.84MB
  • 2. Introduction to Security Operations/03. Security Operations Foundations.mp44.64MB
  • 2. Introduction to Security Operations/04. Conclusion.mp4829.43KB
  • 3. Digital Forensics/05. Introduction to Digital Forensics.mp42.2MB
  • 3. Digital Forensics/06. Digital Forensics Foundations.mp49.62MB
  • 3. Digital Forensics/07. Creating a Digital Forensics Capability.mp413.07MB
  • 3. Digital Forensics/08. Conclusion.mp41.32MB
  • 4. Logging and Monitoring/09. Introduction.mp4868.76KB
  • 4. Logging and Monitoring/10. Logging and Monitoring Basics.mp46.83MB
  • 4. Logging and Monitoring/11. Log Management.mp49.17MB
  • 4. Logging and Monitoring/12. Logging and Monitoring Concerns.mp49.56MB
  • 4. Logging and Monitoring/13. Conclusion.mp4716.45KB
  • 5. Vulnerability Management/14. Introduction.mp4927.73KB
  • 5. Vulnerability Management/15. Vulnerability Assessment.mp49.37MB
  • 5. Vulnerability Management/16. Patch Management.mp47.06MB
  • 5. Vulnerability Management/17. Conclusion.mp4860.7KB
  • 6. Change Management/18. Introduction.mp4923.62KB
  • 6. Change Management/19. Change Control Process.mp411.92MB
  • 6. Change Management/20. Conclusion.mp4879.95KB
  • 7. Operate and Maintain Protective Controls/21. Introduction.mp41.19MB
  • 7. Operate and Maintain Protective Controls/22. Maintaining and Operating Protective Controls.mp414.32MB
  • 7. Operate and Maintain Protective Controls/23. Important Terms and Conclusion.mp43.01MB
  • 8. Incident Management/24. Introduction.mp4812.51KB
  • 8. Incident Management/25. Creating an Incident Response Capability.mp44.72MB
  • 8. Incident Management/26. Incident Response Life Cycle.mp45.36MB
  • 8. Incident Management/27. Conclusion.mp4574.35KB
  • 9. Investigative Types/28. Introduction.mp41.05MB
  • 9. Investigative Types/29. Investigative Types.mp44.88MB
  • 9. Investigative Types/30. Conclusion.mp41.18MB