本站已收录 番号和无损神作磁力链接/BT种子 

Pearson IT Certification - CISSP Complete Video Course

种子简介

种子名称: Pearson IT Certification - CISSP Complete Video Course
文件类型: 视频
文件数目: 108个文件
文件大小: 25.69 GB
收录时间: 2020-10-24 18:12
已经下载: 3
资源热度: 270
最近下载: 2024-12-26 12:28

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:f174bf91c2d825ccf9adef456624283134047719&dn=Pearson IT Certification - CISSP Complete Video Course 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Pearson IT Certification - CISSP Complete Video Course.torrent
  • Lesson 6 Security Assessment and Testing/6.8 Implementing Information Security Continuous Monitoring (ISCM) - CISSP.mp4116.57MB
  • Lesson 6 Security Assessment and Testing/6.9 Understanding Third-Party Audits and Examinations - CISSP.mp4114.27MB
  • Lesson 6 Security Assessment and Testing/6.2 Security Assessment Planning - CISSP.mp4113.6MB
  • Lesson 6 Security Assessment and Testing/End of Lesson Review - CISSP_6.mp491.85MB
  • Lesson 6 Security Assessment and Testing/6.6 Security Assessment Testing--Penetration Testing - CISSP.mp4114.85MB
  • Lesson 6 Security Assessment and Testing/6.7 Understanding Log Analysis - CISSP.mp4125.45MB
  • Lesson 6 Security Assessment and Testing/6.4 Conducting Security Testing--Target Identificaton - CISSP.mp4457.19MB
  • Lesson 6 Security Assessment and Testing/6.5 Conducting Security Testing--Password Cracking - CISSP.mp485.98MB
  • Lesson 6 Security Assessment and Testing/Lesson 6- Security Assessment and Testing - CISSP.mp411.3MB
  • Lesson 6 Security Assessment and Testing/6.1 Testing and Examination (T&E) Overview - CISSP.mp4124.16MB
  • Lesson 6 Security Assessment and Testing/6.3 Conducting Security Examinations - CISSP.mp4107.87MB
  • Lesson 2 Asset Security/2.3 Protecting Data Privacy - CISSP.mp4123.12MB
  • Lesson 2 Asset Security/2.1 Classifying Assets - CISSP.mp4150MB
  • Lesson 2 Asset Security/2.2 Managing Assets - CISSP.mp4114.38MB
  • Lesson 2 Asset Security/Lesson 2 - Asset Security - CISSP.mp49.47MB
  • Lesson 2 Asset Security/End of Lesson Review - CISSP_2.mp4335.11MB
  • Lesson 2 Asset Security/2.4 Ensuring Appropriate Retention and Destruction - CISSP.mp4165.19MB
  • Lesson 2 Asset Security/2.5 Determining Data Security Controls - CISSP.mp4132.99MB
  • Lesson 3 Security Engineering/Lesson 3- Security Engineering - CISSP.mp410.37MB
  • Lesson 3 Security Engineering/3.4 Recognizing Information Systems Security Capabilities - CISSP.mp4132.36MB
  • Lesson 3 Security Engineering/3.10 Applying Cryptography--Encryption Part 1 - CISSP.mp4558.43MB
  • Lesson 3 Security Engineering/3.2 Understanding Security Models - CISSP.mp4132.63MB
  • Lesson 3 Security Engineering/3.5 Assessing and Mitigating Security Architecture Vulnerabilities - CISSP.mp4113.15MB
  • Lesson 3 Security Engineering/3.12 Applying Cryptography--Public Key Infrastructure - CISSP.mp4139.04MB
  • Lesson 3 Security Engineering/3.3 Selecting Controls Based on Systems Security Evaluation Models - CISSP.mp4112.72MB
  • Lesson 3 Security Engineering/3.8 Assessing and Mitigating Mobile and Remote Computing Vulnerabilities - CISSP.mp498.23MB
  • Lesson 3 Security Engineering/3.11 Applying Cryptography--Encryption Part 2 - CISSP.mp4538.43MB
  • Lesson 3 Security Engineering/End of Lesson Review - CISSP_3.mp4393.37MB
  • Lesson 3 Security Engineering/3.1 Implementing Secure Design Principles - CISSP.mp4174.26MB
  • Lesson 3 Security Engineering/3.17 Securing Information Processing Facilities and Equipment - CISSP.mp4337.35MB
  • Lesson 3 Security Engineering/3.16 Applying Secure Principles to Site and Facility Design - CISSP.mp4493.64MB
  • Lesson 3 Security Engineering/3.13 Applying Cryptography--Hashing and Digital Signature - CISSP.mp4177.85MB
  • Lesson 3 Security Engineering/3.7 Assessing and Mitigating Web Vulnerabilities - CISSP.mp483.27MB
  • Lesson 3 Security Engineering/3.15 Applying Cryptography--Crypto Attacks - CISSP.mp469.97MB
  • Lesson 3 Security Engineering/3.9 Introducing Cryptography - CISSP.mp491.88MB
  • Lesson 3 Security Engineering/3.6 Assessing and Mitigating Cloud Vulnerabilities - CISSP.mp483.59MB
  • Lesson 3 Security Engineering/3.14 Applying Cryptography--Cryptographic Protocols - CISSP.mp4263.79MB
  • Lesson 3 Security Engineering/3.9 Introducing Cryptography - CISSP_2.mp4443.22MB
  • Lesson 7 Security Operations/7.13 Supporting Incident Management - CISSP.mp4739.62MB
  • Lesson 7 Security Operations/7.3 Conducting Logging and Monitoring Activities - CISSP.mp4414.38MB
  • Lesson 7 Security Operations/7.5 Implementing and Supporting Malware Management - CISSP.mp4592.75MB
  • Lesson 7 Security Operations/7.4 Implementing and Supporting Vulnerability and Patch Management - CISSP.mp4738.77MB
  • Lesson 7 Security Operations/7.11 Understanding and Supporting Investigations - CISSP.mp4525.01MB
  • Lesson 7 Security Operations/7.10 Managing DR Plan Maintenance - CISSP.mp4453.36MB
  • Lesson 7 Security Operations/7.14 Securing People and Places - CISSP.mp4368.16MB
  • Lesson 7 Security Operations/7.1 Managing Privileged Accounts - CISSP.mp4434.94MB
  • Lesson 7 Security Operations/7.2 Operating and Maintaining Firewalls and IDS_IPS - CISSP.mp4610.4MB
  • Lesson 7 Security Operations/7.12 Understanding Digital Forensics - CISSP.mp4452.84MB
  • Lesson 1 Security and Risk Management/1.5 Understanding Legal Systems and Related Laws--Part 1 - CISSP.mp457.76MB
  • Lesson 1 Security and Risk Management/1.8 Understanding Regulatory and Contractual Requirements--Part 2 - CISSP.mp4124.29MB
  • Lesson 1 Security and Risk Management/1.10 Implementing Third-Party Security - CISSP.mp473.83MB
  • Lesson 1 Security and Risk Management/1.14 Conducting a Quantitative Risk Assessment - CISSP.mp4191.38MB
  • Lesson 1 Security and Risk Management/1.4 Designing and Implementing Governance Documents - CISSP.mp4172.77MB
  • Lesson 1 Security and Risk Management/1.6 Understanding Legal Systems and Related Laws--Part 2 - CISSP.mp4114.72MB
  • Lesson 1 Security and Risk Management/1.9 Implementing Personnel Security - CISSP.mp4158.24MB
  • Lesson 1 Security and Risk Management/1.13 Exploring Risk Assessment Methodologies - CISSP.mp485.16MB
  • Lesson 1 Security and Risk Management/1.10 Implementing Third-Party Security - CISSP_2.mp473.83MB
  • Lesson 1 Security and Risk Management/1.12 Understanding & Implementing Risk Management Concepts - CISSP.mp4151.23MB
  • Lesson 1 Security and Risk Management/Lesson 1- Security and Risk Management - CISSP.mp411.77MB
  • Lesson 1 Security and Risk Management/1.17 Managing Supply Chain Risk - CISSP.mp4100.74MB
  • Lesson 1 Security and Risk Management/1.16 Selecting Controls and Countermeasures - CISSP.mp4147.27MB
  • Lesson 1 Security and Risk Management/1.15 Conducting a Qualitative Risk Assessment - CISSP.mp4189.86MB
  • Lesson 1 Security and Risk Management/1.1 Examining Information Security Fundamentals - CISSP.mp4123.48MB
  • Lesson 1 Security and Risk Management/1.2 Applying Security Governance Concepts--Part 1 - CISSP.mp4105.75MB
  • Lesson 1 Security and Risk Management/1.11 Understanding and Applying Threat Modeling - CISSP.mp499.15MB
  • Lesson 1 Security and Risk Management/1.3 Applying Security Governance Concepts--Part 2 - CISSP.mp4132.08MB
  • Lesson 1 Security and Risk Management/1.7 Understanding Regulatory and Contractual Requirements--Part 1 - CISSP.mp481.08MB
  • Lesson 1 Security and Risk Management/1.18 Implementing Business Continuity Risk Management - CISSP.mp4134.02MB
  • Lesson 1 Security and Risk Management/End of Lesson Review - CISSP.mp4171.42MB
  • Lesson 9 Preparing for the Exam/9.8 Software Development Security Domain- Review and Study Roadmap - CISSP.mp429.6MB
  • Lesson 9 Preparing for the Exam/9.5 Identity and Access Domain- Review and Study Roadmap - CISSP.mp430.77MB
  • Lesson 9 Preparing for the Exam/9.9 Taking the CISSP Examination - CISSP.mp429.88MB
  • Lesson 9 Preparing for the Exam/Lesson 9- Preparing for the Exam - CISSP.mp45.4MB
  • Lesson 9 Preparing for the Exam/9.2 Asset Security Domain- Review and Study Roadmap - CISSP.mp495.89MB
  • Lesson 9 Preparing for the Exam/9.4 Communications and Network Security Domain- Review and Study Roadmap - CISSP.mp441.94MB
  • Lesson 9 Preparing for the Exam/9.1 Security and Risk Management Domain- Review and Study Roadmap - CISSP.mp473.14MB
  • Lesson 9 Preparing for the Exam/9.6 Security Assessment and Testing Domain- Review and Study Roadmap - CISSP.mp433.06MB
  • Lesson 9 Preparing for the Exam/9.7 Security Operations Domain- Review and Study Roadmap - CISSP.mp448.94MB
  • Lesson 9 Preparing for the Exam/9.3 Security Engineering Domain- Review and Study Roadmap - CISSP.mp459.29MB
  • Lesson 8 Software Development Security/8.2 Understanding Software Development Approaches, Models, and Tools - CISSP.mp4123.68MB
  • Lesson 8 Software Development Security/8.5 Assessing the Security Impact of Acquired Software - CISSP.mp4315.72MB
  • Lesson 8 Software Development Security/8.1 Managing the Software Development Lifecycle - CISSP.mp4132.18MB
  • Lesson 8 Software Development Security/8.4 Managing Database Security - CISSP.mp4479.19MB
  • Lesson 8 Software Development Security/End of Lesson Review - CISSP_8.mp4452.7MB
  • Lesson 8 Software Development Security/Lesson 8- Software Development Security - CISSP.mp411.61MB
  • Lesson 8 Software Development Security/8.3 Understanding Source Code Security Issues - CISSP.mp4479.34MB
  • Lesson 5 Identity and Access Management/End of Lesson Review - CISSP_5.mp4103.29MB
  • Lesson 5 Identity and Access Management/5.7 Implementing Access Control Techniques and Technologies - CISSP.mp4414.61MB
  • Lesson 5 Identity and Access Management/5.6 Implementing Access Control Models - CISSP.mp4126.65MB
  • Lesson 5 Identity and Access Management/5.1 Understanding Access Control Fundamentals - CISSP.mp4425.46MB
  • Lesson 5 Identity and Access Management/5.2 Examining Identification Schemas - CISSP.mp4621.46MB
  • Lesson 5 Identity and Access Management/Lesson 5- Identity and Access Management - CISSP.mp410.83MB
  • Lesson 5 Identity and Access Management/5.3 Understanding Authentication Options - CISSP.mp4886.9MB
  • Lesson 5 Identity and Access Management/5.4 Understanding Authentication Systems - CISSP.mp4315.78MB
  • Lesson 5 Identity and Access Management/5.5 Implementing Access and Authorization Criteria - CISSP.mp4417.58MB
  • Lesson 5 Identity and Access Management/5.8 Identity and Accessing Provisioning - CISSP.mp4124.02MB
  • Lesson 4 Communications and Network Security/4.8 Securing Virtual Private Networks - CISSP.mp4550.21MB
  • Lesson 4 Communications and Network Security/End of Lesson Review - CISSP_4.mp4508.69MB
  • Lesson 4 Communications and Network Security/4.3 Securing Wireless Networks - CISSP.mp4322.78MB
  • Lesson 4 Communications and Network Security/4.10 Preventing and Mitigating Network Attacks - CISSP.mp4858.04MB
  • Lesson 4 Communications and Network Security/4.2 Understanding IP Convergence and Extensibility - CISSP.mp4254.8MB
  • Lesson 4 Communications and Network Security/4.1 Reviewing OSI and TCP_IP Models - CISSP.mp4749.48MB
  • Lesson 4 Communications and Network Security/Lesson 4- Communications and Network Security - CISSP.mp415.8MB
  • Lesson 4 Communications and Network Security/4.6 Securing Data Transmissions - CISSP.mp4540.46MB
  • Lesson 4 Communications and Network Security/4.4 Using Cryptography to Maintain Communication Security - CISSP.mp4236.29MB
  • Lesson 4 Communications and Network Security/4.7 Securing Multimedia Collaboration - CISSP.mp4441.85MB
  • Lesson 4 Communications and Network Security/4.9 Securing Endpoints - CISSP.mp4548.82MB
  • Lesson 4 Communications and Network Security/4.5 Securing Network Access - CISSP.mp4622.45MB