Certified Information Systems Security Professional - CISSP

磁链地址复制复制磁链成功
磁链详情
文件数目:206个文件
文件大小:17.37 GB
收录时间:2025-05-02
访问次数:1
相关内容:CertifiedInformationSystemsSecurityProfessionalCISSP
文件meta
  • Chapter 3 Security Architecture and Engineering/008. Assess and mitigate vulnerabilities - the rest.mp4
    321.12 MB
  • Chapter 3 Security Architecture and Engineering/017. Spotlight on fire control.mp4
    309.29 MB
  • Chapter 5 Identity and Access Management (IAM)/005. Implement, manage auth mechanisms - Models.mp4
    306.31 MB
  • Chapter 3 Security Architecture and Engineering/016. Design site and facility security controls.mp4
    305.78 MB
  • Chapter 8 Software Development Security/012. Spotlight on Databases.mp4
    293.75 MB
  • Chapter 3 Security Architecture and Engineering/007. Assess and mitigate vulnerabilities - the basics.mp4
    291.66 MB
  • Chapter 3 Security Architecture and Engineering/006. Security capabilities of Info Systems - Memory.mp4
    288.93 MB
  • Chapter 4 Communication and Network Security/009. Implement Secure Communication Channels.mp4
    281.14 MB
  • Chapter 7 Security Operations/006. Apply resource protection.mp4
    276.24 MB
  • Chapter 7 Security Operations/004. Perform Configuration Management (CM).mp4
    275.27 MB
  • Chapter 7 Security Operations/003. Conduct logging & monitoring activities - threat.mp4
    267.72 MB
  • Chapter 4 Communication and Network Security/006. Spotlight on Micro-segmentation.mp4
    261.35 MB
  • Chapter 5 Identity and Access Management (IAM)/009. Spotlight on Federated Identity Management (FIM).mp4
    259.38 MB
  • Chapter 2 Asset Security/003. Provision resources securely.mp4
    254.22 MB
  • Chapter 1 Security and Risk Management/007. Spotlight on the GDPR.mp4
    247.16 MB
  • Chapter 7 Security Operations/002. Conduct logging & monitoring activities.mp4
    246.74 MB
  • Chapter 3 Security Architecture and Engineering/015. Security principles for site and facility design.mp4
    241.43 MB
  • Chapter 1 Security and Risk Management/006. Legal, regulatory issues for information security.mp4
    238.76 MB
  • Chapter 5 Identity and Access Management (IAM)/004. Implement, manage auth mechanisms - Vocab.mp4
    230.61 MB
  • Chapter 3 Security Architecture and Engineering/005. Security capabilities of Information Systems - CPU.mp4
    222 MB
  • Chapter 2 Asset Security/002. Establish information, asset handling requirements.mp4
    221.07 MB
  • Chapter 8 Software Development Security/010. Assess security impact of acquired software.mp4
    221.01 MB
  • Chapter 5 Identity and Access Management (IAM)/008. Spotlight on Kerberos.mp4
    219.41 MB
  • Chapter 7 Security Operations/016. Address personnel safety and security concerns.mp4
    210.26 MB
  • Chapter 8 Software Development Security/011. Define, apply secure coding guidelines, standards.mp4
    210.04 MB
  • Chapter 1 Security and Risk Management/012. Understand, apply risk management concepts.mp4
    209.62 MB
  • Chapter 5 Identity and Access Management (IAM)/001. Control physical and logical access to assets.mp4
    206.28 MB
  • Chapter 3 Security Architecture and Engineering/009. Spotlight on cryptographic solutions - Symmetric.mp4
    204.96 MB
  • Chapter 5 Identity and Access Management (IAM)/003. Federated identity with a third-party service.mp4
    203.12 MB
  • Chapter 8 Software Development Security/003. Security in the SDLC - Methodologies.mp4
    197.23 MB
  • Chapter 7 Security Operations/001. Understand and comply with investigations.mp4
    197 MB
  • Chapter 8 Software Development Security/009. Assess the effectiveness of software security.mp4
    195.31 MB
  • Chapter 7 Security Operations/015. Implement and manage physical security.mp4
    195.1 MB
  • Chapter 4 Communication and Network Security/003. Spotlight on IPsec.mp4
    194.96 MB
  • Chapter 8 Software Development Security/005. Security in the SDLC - odds & ends.mp4
    191.64 MB
  • Chapter 8 Software Development Security/001. Spotlight on the Software Development Life Cycle.mp4
    190.49 MB
  • Chapter 1 Security and Risk Management/003. Understand and apply security concepts (CIA).mp4
    189.78 MB
  • Chapter 8 Software Development Security/006. Apply controls in development ecosystems - basics.mp4
    188.12 MB
  • Chapter 6 Security Assessment and Testing/003. Conduct security control testing - the basics.mp4
    187.86 MB
  • Chapter 1 Security and Risk Management/010. Identify, analyze, prioritize BC requirements.mp4
    186.57 MB
  • Chapter 6 Security Assessment and Testing/004. Conduct security control testing - the rest.mp4
    180.92 MB
  • Chapter 3 Security Architecture and Engineering/012. Spotlight on cryptographic solutions - hashing.mp4
    179.95 MB
  • Chapter 7 Security Operations/008. Detective & preventative measures.mp4
    179.31 MB
  • Chapter 1 Security and Risk Management/015. Apply Supply Chain Risk Management (SCRM) concepts.mp4
    177.8 MB
  • Chapter 1 Security and Risk Management/011. Personnel security policies and procedures.mp4
    177.73 MB
  • Chapter 8 Software Development Security/004. Security in the SDLC - Maturity Models.mp4
    175.97 MB
  • Chapter 3 Security Architecture and Engineering/011. Spotlight on cryptographic solutions - PKI & certs.mp4
    173.25 MB
  • Chapter 4 Communication and Network Security/008. Secure Network Components.mp4
    167.4 MB
  • Chapter 6 Security Assessment and Testing/005. Collect security process data.mp4
    166.62 MB
  • Chapter 1 Security and Risk Management/004. Evaluate and apply security governance principles.mp4
    165.86 MB
©2018 ciligou.app 磁力狗 v2.0
使用必读|联系我们|资源导航|种子提交