zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[GigaCourse.Com] Udemy - Certified Information Systems Security Officer (CISSO)
magnet:?xt=urn:btih:949036079e5b4d9c692483092db57e921c70f58e&dn=[GigaCourse.Com] Udemy - Certified Information Systems Security Officer (CISSO)
磁力链接详情
Hash值:
949036079e5b4d9c692483092db57e921c70f58e
点击数:
76
文件大小:
5.41 GB
文件数量:
74
创建日期:
2024-10-15 21:14
最后访问:
2024-12-25 16:20
访问标签:
GigaCourse
Com
Udemy
-
Certified
Information
Systems
Security
Officer
CISSO
文件列表详情
01 - Module 01 - Risk Management/001 Agenda.mp4 43.43 MB
01 - Module 01 - Risk Management/002 Risk Management.mp4 60.8 MB
01 - Module 01 - Risk Management/003 Quantitative Analysis.mp4 60.73 MB
02 - Module 02 - Security Management/001 Security Management.mp4 56.53 MB
02 - Module 02 - Security Management/002 Enterprise Security Program.mp4 24.25 MB
02 - Module 02 - Security Management/003 Roadmap to Maturity.mp4 55.44 MB
02 - Module 02 - Security Management/004 Human Resources Issues.mp4 49.64 MB
03 - Module 03 -Authentication/001 Authentication.mp4 128.59 MB
03 - Module 03 -Authentication/002 Biometrics Error Types.mp4 35.23 MB
03 - Module 03 -Authentication/003 Memory Cards.mp4 58.6 MB
03 - Module 03 -Authentication/004 Issues Pertaining to Kerberos.mp4 38.91 MB
04 - Module 04 - Access Control/001 Access Control.mp4 115.39 MB
04 - Module 04 - Access Control/002 Access Control Characteristics.mp4 64.56 MB
04 - Module 04 - Access Control/003 Threats to Access Control.mp4 65.16 MB
04 - Module 04 - Access Control/004 Information Classification.mp4 74.67 MB
04 - Module 04 - Access Control/005 Discretionary Access Control Model.mp4 61.01 MB
04 - Module 04 - Access Control/006 Access Control Administration.mp4 56.85 MB
05 - Module 05 - Security Models/001 Security Models and Evaluation Criteria.mp4 85.51 MB
05 - Module 05 - Security Models/002 What Does It Mean to Be in a Specific Ring.mp4 131.42 MB
05 - Module 05 - Security Models/003 Non-Interference Model.mp4 60 MB
05 - Module 05 - Security Models/004 ITSEC - Good and Bad.mp4 86.44 MB
06 - Module 06 - Operations Security/001 Information Classification.mp4 60.21 MB
06 - Module 06 - Operations Security/002 Product Implementation Concerns.mp4 88.65 MB
06 - Module 06 - Operations Security/003 Redundant Array of Independent Disk (RAID).mp4 51.31 MB
06 - Module 06 - Operations Security/004 Methodology.mp4 141.61 MB
07 - Module 07 - Symmetric Cryptography and Hashing/001 Symmetric Cryptography and Hashing.mp4 59.75 MB
07 - Module 07 - Symmetric Cryptography and Hashing/002 Historical Uses of Symmetric Cryptography Vernam Cipher.mp4 53.48 MB
07 - Module 07 - Symmetric Cryptography and Hashing/003 Information Classification.mp4 157.78 MB
07 - Module 07 - Symmetric Cryptography and Hashing/004 Symmetric Algorithms - DS.mp4 120.35 MB
08 - Module 08 - Asymmetric Cryptography and PKI/001 Asymmetric Cryptography and PKI.mp4 60.84 MB
08 - Module 08 - Asymmetric Cryptography and PKI/002 Example of Hybrid Cryptography.mp4 74.61 MB
08 - Module 08 - Asymmetric Cryptography and PKI/003 CA and RA Roles.mp4 57.04 MB
08 - Module 08 - Asymmetric Cryptography and PKI/004 Link versus End-to-End Encryption.mp4 76.88 MB
08 - Module 08 - Asymmetric Cryptography and PKI/005 IPSec Handshaking Process.mp4 51.19 MB
08 - Module 08 - Asymmetric Cryptography and PKI/006 Types of Physical IDS.mp4 93.46 MB
09 - Module 09 - Network Connections/001 Information Classification.mp4 60.96 MB
09 - Module 09 - Network Connections/002 Summary of Topologies.mp4 79.44 MB
09 - Module 09 - Network Connections/003 Transmission Types - Number of Recievers.mp4 57.23 MB
09 - Module 09 - Network Connections/004 Network Topologies.mp4 54.28 MB
09 - Module 09 - Network Connections/005 WAN Technologies - DSL.mp4 57.72 MB
10 - Module 10 - Network Protocols and Devices/001 Information Classification.mp4 55.61 MB
10 - Module 10 - Network Protocols and Devices/002 Transport Layer.mp4 94.46 MB
10 - Module 10 - Network Protocols and Devices/003 Repeater.mp4 69.01 MB
10 - Module 10 - Network Protocols and Devices/004 Firewall Types - Circuit - Level Proxy Firewall.mp4 54.24 MB
10 - Module 10 - Network Protocols and Devices/005 TCPIP Suite.mp4 51.49 MB
11 - Module 11 - Telephony, VPNs and Wireless/001 Information Classification.mp4 58.4 MB
11 - Module 11 - Telephony, VPNs and Wireless/002 PBX Vulnerabilities.mp4 39.06 MB
11 - Module 11 - Telephony, VPNs and Wireless/003 SSLTLS.mp4 27.78 MB
11 - Module 11 - Telephony, VPNs and Wireless/004 Wireless Network Topologies.mp4 92.51 MB
11 - Module 11 - Telephony, VPNs and Wireless/005 WPA and WPA2 Mode Types.mp4 113.72 MB
12 - Module 12 - Security Architecture/001 Information Classification.mp4 118.73 MB
12 - Module 12 - Security Architecture/002 Integrated Security is Designed Security.mp4 63.35 MB
12 - Module 12 - Security Architecture/003 System Functionality.mp4 40.3 MB
12 - Module 12 - Security Architecture/004 Attacking Through Applications.mp4 42.51 MB
13 - Module 13 - Software Development Security/001 Information Classification.mp4 144.45 MB
13 - Module 13 - Software Development Security/002 Development Methodologies.mp4 44.82 MB
13 - Module 13 - Software Development Security/003 Security Issues.mp4 46.93 MB
13 - Module 13 - Software Development Security/004 Linking Through COM.mp4 125.39 MB
14 - Module 14 - Database Security and System Development/001 Information Classification.mp4 83.45 MB
14 - Module 14 - Database Security and System Development/002 Artificial Intelligence.mp4 140.97 MB
14 - Module 14 - Database Security and System Development/003 Virus.mp4 77.63 MB
14 - Module 14 - Database Security and System Development/004 DDoS.mp4 56.44 MB
15 - Module 15 - Malware and Software Attacks/001 Malware and Attacks.mp4 130.56 MB
16 - Module 16 - Business Continuity/001 Information Classification.mp4 98.75 MB
16 - Module 16 - Business Continuity/002 How to Identify the Most Critical Company Functions.mp4 43.58 MB
16 - Module 16 - Business Continuity/003 Facility Backups - Hot Site.mp4 70.1 MB
17 - Module 17 - Disaster Recovery/001 Disaster Recovery.mp4 47.93 MB
17 - Module 17 - Disaster Recovery/002 Recovery Plan.mp4 98.52 MB
17 - Module 17 - Disaster Recovery/003 Return to Normal Operations.mp4 47.74 MB
18 - Module 18 - Incident Management, Law, and Ethics/001 Information Classification.mp4 129.46 MB
18 - Module 18 - Incident Management, Law, and Ethics/002 Intellectual Property Law.mp4 56.77 MB
18 - Module 18 - Incident Management, Law, and Ethics/003 Countries Working Together.mp4 119.64 MB
18 - Module 18 - Incident Management, Law, and Ethics/004 Privacy of Sensitive Data.mp4 52.94 MB
19 - Module 19 – Physical/001 Information Classification.mp4 135.27 MB
其他位置