CISSP, 3rd Edition

磁链地址复制复制磁链成功
磁链详情
文件数目:452个文件
文件大小:6.11 GB
收录时间:2025-04-28
访问次数:1
相关内容:CISSPEdition
文件meta
  • Module 4 Communication and Network Security/Lesson 30 Secure Network Components/004. 30.3 Security Zones and Firewalls.mp4
    64 MB
  • Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/004. 24.3 Cloud-based Systems.mp4
    60.22 MB
  • Module 8 Software Development Security/Lesson 59 Identify and Apply Security Controls in Software Development Ecosystems/003. 59.2 Secure Staging.mp4
    60.13 MB
  • Module 8 Software Development Security/Lesson 62 Define and Apply Secure Coding Guidelines and Standards/003. 62.2 Input and Output Validation.mp4
    57.26 MB
  • Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/002. 29.1 Network Models.mp4
    56.19 MB
  • Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/002. 11.1 Threat Actors and Attributes.mp4
    53.05 MB
  • Module 1 Security and Risk Management Domain/Lesson 10 Understand and Apply Risk Management Concepts/004. 10.3 Risk Assessment.mp4
    52.91 MB
  • Module 4 Communication and Network Security/Lesson 30 Secure Network Components/007. Lesson 30 Assessment.mp4
    51.61 MB
  • Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/002. 43.1 Evidence Handling.mp4
    51.49 MB
  • Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/003. 3.2 Organizational Roles and Responsibilities.mp4
    51.04 MB
  • Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/003. Lesson 40-42 Assessment.mp4
    49.93 MB
  • Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/008. 29.7 Wireless Architecture.mp4
    49.87 MB
  • Module 7 Security Operations/Lesson 52 Implement Recovery Strategies/003. 52.2 Resiliency.mp4
    49.56 MB
  • Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/002. 13.1 SETA Principles and Practices.mp4
    49.13 MB
  • Module 7 Security Operations/Lesson 56 Implement and Manage Physical Security/002. 56.1 Perimeter and Internal Security Controls.mp4
    48.83 MB
  • Module 7 Security Operations/Lesson 51 Understand and Participate in Change Management Process/003. Lesson 48-51 Assessment.mp4
    48.11 MB
  • Module 7 Security Operations/Lesson 43 Understand and Comply with Investigations/003. 43.2 Digital Forensics.mp4
    47.17 MB
  • Module 3 Security Architecture and Engineering/Lesson 23 Understand Security Capabilities of Information Systems/002. 23.1 Information Systems Security Capabilities.mp4
    47.05 MB
  • Module 5 Identity and Access Management (IAM)/Lesson 35 Implement and Manage Authorization Mechanisms/003. Lesson 32-35 Assessment.mp4
    46.88 MB
  • Module 6 Security Assessment and Testing/Lesson 42 Conduct or Facilitate Security Audits/002. 42.1 Security Audits.mp4
    46.86 MB
  • Module 7 Security Operations/Lesson 49 Operate and Maintain Detective and Preventative Measures/003. 49.2 Anti-Malware Tools and Techniques.mp4
    46.7 MB
  • Module 1 Security and Risk Management Domain/Lesson 4 Determine Compliance and Other Requirements/003. 4.2 Privacy and Data Protection.mp4
    46.66 MB
  • Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/009. Lesson 24 Assessment.mp4
    46.53 MB
  • Module 4 Communication and Network Security/Lesson 29 Assess and Implement Secure Design Principles in Network Architecture/003. 29.2 IP Networking.mp4
    46.41 MB
  • Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/002. 25.1 Ciphers and Keys.mp4
    46.33 MB
  • Module 1 Security and Risk Management Domain/Lesson 1 Understand, Adhere to, and Promote Professional Ethics/002. 1.1 Organizational and Professional Ethics.mp4
    46.23 MB
  • Module 2 Asset Security/Lesson 17 Manage Data Lifecycle/002. 17.1 Data Collection and Retention.mp4
    45.93 MB
  • Module 2 Asset Security/Lesson 19 Determine Data Security Controls and Compliance Requirements/004. Lesson 14-19 Assessment.mp4
    45.71 MB
  • Module 5 Identity and Access Management (IAM)/Lesson 37 Implement Authentication Systems/002. 37.1 Authentication Protocols.mp4
    45.7 MB
  • Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/003. 44.2 Detection and Response Tools.mp4
    45.69 MB
  • Module 1 Security and Risk Management Domain/Lesson 13 Establish and Maintain a Security Awareness, Education, and Training Program/004. Lesson 10-13 Assessment.mp4
    45.66 MB
  • Module 1 Security and Risk Management Domain/Lesson 11 Understand and Apply Threat Modeling Concepts and Methodologies/004. 11.3 Attack Vectors.mp4
    45.65 MB
  • Module 8 Software Development Security/Lesson 58 Understand and Integrate Security in the Software Development Lifecycle/002. 58.1 Software Development Lifecycle.mp4
    45.16 MB
  • Module 4 Communication and Network Security/Lesson 30 Secure Network Components/005. 30.4 Network Access Control.mp4
    45.07 MB
  • Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/003. 25.2 Symmetric Encryption.mp4
    45.06 MB
  • Module 7 Security Operations/Lesson 54 Test Disaster Recovery Plans/002. 54.1 DRP Training and Testing.mp4
    45.03 MB
  • Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/005. 25.4 Hashing and Digital Signatures.mp4
    44.87 MB
  • Module 3 Security Architecture and Engineering/Lesson 20 Research, Implement, and Manage Engineering Processes Using Secure Design Principles/002. 20.1 Secure Design Principles.mp4
    44.76 MB
  • Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/002. 28.1 Site and Building Security.mp4
    44.34 MB
  • Module 7 Security Operations/Lesson 50 Implement and Support Patch and Vulnerability Management/002. 50.1 Vulnerability and Patch Management.mp4
    44.28 MB
  • Module 7 Security Operations/Lesson 44 Conduct Logging and Monitoring Activities/002. 44.1 Logging and Analysis.mp4
    44.12 MB
  • Module 1 Security and Risk Management Domain/Lesson 3 Evaluate and Apply Security Governance Principles/004. 3.3 Security Control Frameworks.mp4
    43.92 MB
  • Module 7 Security Operations/Lesson 48 Conduct Incident Management/003. 48.2 Incident Response and Handling.mp4
    43.85 MB
  • Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/006. 25.5 PKI and Digital Certificates.mp4
    43.85 MB
  • Module 3 Security Architecture and Engineering/Lesson 28 Design Site and Facility Security Controls/003. 28.2 Environmental Impact.mp4
    43.66 MB
  • Module 3 Security Architecture and Engineering/Lesson 21 Understand the Fundamental Concepts of Security Models/002. 21.1 Information Security Models.mp4
    43.66 MB
  • Module 6 Security Assessment and Testing/Lesson 41 Analyze Test Output and Generate Report/002. 41.1 Reporting and Response.mp4
    43.22 MB
  • Module 3 Security Architecture and Engineering/Lesson 24 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements/008. 24.7 Automation and Solution Elements.mp4
    43.1 MB
  • Module 7 Security Operations/Lesson 47 Apply Resource Protection/003. 47.2 Mobile Device Management.mp4
    42.9 MB
  • Module 3 Security Architecture and Engineering/Lesson 25 Select and Determine Cryptographic Solutions/004. 25.3 Asymmetric Encryption.mp4
    42.86 MB
©2018 ciligou.app 磁力狗 v2.0
使用必读|联系我们|资源导航|种子提交