种子简介
种子名称:
Enterprise Security Policies, Practices, and Procedures
文件类型:
视频
文件数目:
37个文件
文件大小:
238.19 MB
收录时间:
2017-9-20 23:19
已经下载:
3次
资源热度:
220
最近下载:
2024-12-27 05:54
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:af08228a9ba2619935b0e02d98716b64b35b14bd&dn=Enterprise Security Policies, Practices, and Procedures
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Enterprise Security Policies, Practices, and Procedures.torrent
01. Course Overview/01. Course Overview.mp44.07MB
02. Security Data Analytics What's Going On/01. Series Introductionoverview.mp410.57MB
02. Security Data Analytics What's Going On/02. Module Overview.mp41.36MB
02. Security Data Analytics What's Going On/03. Teaching an Old Dog New Tricks.mp415.16MB
02. Security Data Analytics What's Going On/04. Trend Analysis.mp48.65MB
02. Security Data Analytics What's Going On/05. Data Aggregation and Correlation.mp44.69MB
02. Security Data Analytics What's Going On/06. Historical Analysis.mp416.9MB
02. Security Data Analytics What's Going On/07. Summary.mp41.78MB
03. Defense in Depth This Is Where It Begins/01 Introduction and Overview.mp41.34MB
03. Defense in Depth This Is Where It Begins/02. What Is Defense in Depth.mp416.89MB
03. Defense in Depth This Is Where It Begins/04. Level 2 Processes.mp43.54MB
03. Defense in Depth This Is Where It Begins/05. Level 3 Technologies.mp43.45MB
03. Defense in Depth This Is Where It Begins/06. Level 4 The Network.mp43.99MB
03. Defense in Depth This Is Where It Begins/07. Summary.mp42.4MB
04. Defense in Depth What Tools Can You Use/01. Introduction and Overview.mp42.07MB
04. Defense in Depth What Tools Can You Use/02. Let's Break It Down!.mp49.9MB
04. Defense in Depth What Tools Can You Use/03. IPSHIPS.mp413.15MB
04. Defense in Depth What Tools Can You Use/04. Firewalls Softwarehardware.mp44.11MB
04. Defense in Depth What Tools Can You Use/05. Anti-virusanti-malware.mp41.9MB
04. Defense in Depth What Tools Can You Use/06. EMET.mp412.21MB
04. Defense in Depth What Tools Can You Use/07. Web Proxies & WAFs.mp47.59MB
04. Defense in Depth What Tools Can You Use/08. A New Hope.mp413.07MB
04. Defense in Depth What Tools Can You Use/09. Summary.mp42.44MB
05. Defense in Depth Drill, Test, Rinse, Repeat/01. Introduction and Overview.mp41.13MB
05. Defense in Depth Drill, Test, Rinse, Repeat/02. Why Penetration Tests.mp46.61MB
05. Defense in Depth Drill, Test, Rinse, Repeat/03. Rules Are Rules.mp49.95MB
05. Defense in Depth Drill, Test, Rinse, Repeat/04. Reverse Engineering.mp44.07MB
05. Defense in Depth Drill, Test, Rinse, Repeat/05. Teams Involved.mp44.7MB
05. Defense in Depth Drill, Test, Rinse, Repeat/06. Risk Evaluation.mp47.39MB
05. Defense in Depth Drill, Test, Rinse, Repeat/07. Summary.mp41.95MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/01. Introduction and Overview.mp41.09MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/02. Frameworks.mp46.8MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/03. Policies.mp412.2MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/04. Controls.mp46.62MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/05. Procedures.mp47.15MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/06. Quality Controls & Verification.mp45.87MB
06. The Fundamentals of Frameworks, Policies, Controls, & Procedures/07. Module & Course Summary.mp41.39MB