CBTN49

mp4   Hot:5   Size:2.09 GB   Created:2024-03-15 17:52:07   Update:2024-11-03 01:44:15  

Download link

File List

  • 1 - Information Security: Security and Risk Management/1 - CIA Concepts.mp4 18.2 MB
    1 - Information Security: Security and Risk Management/10 - DR, BC, and BIA.mp4 23.16 MB
    1 - Information Security: Security and Risk Management/11 - Security Awareness Training.mp4 19.08 MB
    1 - Information Security: Security and Risk Management/12 - Intellectual Property and Licensing.mp4 25.69 MB
    1 - Information Security: Security and Risk Management/13 - Policy Life Cycle.mp4 24.53 MB
    1 - Information Security: Security and Risk Management/14 - Threat Modeling.mp4 24.76 MB
    1 - Information Security: Security and Risk Management/15 - Supply Chain Risk Management.mp4 22.4 MB
    1 - Information Security: Security and Risk Management/2 - Cyber Crime Terms and Vocabulary.mp4 16.93 MB
    1 - Information Security: Security and Risk Management/3 - 27000 Series Framework.mp4 23.7 MB
    1 - Information Security: Security and Risk Management/4 - Due Care and Due Diligence.mp4 20.51 MB
    1 - Information Security: Security and Risk Management/5 - Inside Threats and Ethics.mp4 21.61 MB
    1 - Information Security: Security and Risk Management/6 - Policies Start with Senior Management.mp4 22.97 MB
    1 - Information Security: Security and Risk Management/7 - Defining Risk.mp4 19.04 MB
    1 - Information Security: Security and Risk Management/8 - Control Types.mp4 18.51 MB
    1 - Information Security: Security and Risk Management/9 - Compliance Requirements.mp4 23.12 MB
    2 - Information Security: Asset Security/1 - Classifying Assets and Information.mp4 31.88 MB
    2 - Information Security: Asset Security/2 - Stewards and Custodians of Assets and Information .mp4 28.54 MB
    2 - Information Security: Asset Security/3 - Protecting Privacy.mp4 18.04 MB
    2 - Information Security: Asset Security/4 - Data Retention.mp4 16.5 MB
    2 - Information Security: Asset Security/5 - Determining Security Controls.mp4 21.29 MB
    2 - Information Security: Asset Security/6 - Data State and Resources for Security Control Frameworks.mp4 9.42 MB
    2 - Information Security: Asset Security/7 - Information and Asset Handling Policies.mp4 30.77 MB
    3 - Information Security: Security Architecture and Engineering/1 - Designing with Security in Mind.mp4 24.2 MB
    3 - Information Security: Security Architecture and Engineering/10 - Symmetric Encryption Concepts.mp4 24.72 MB
    3 - Information Security: Security Architecture and Engineering/11 - Symmetric Keys and Algorithms.mp4 17.82 MB
    3 - Information Security: Security Architecture and Engineering/12 - Asymmetric Encryption Concepts.mp4 20.64 MB
    3 - Information Security: Security Architecture and Engineering/13 - Digital Signature Concepts.mp4 24.08 MB
    3 - Information Security: Security Architecture and Engineering/14 - Hashing for Integrity.mp4 19.07 MB
    3 - Information Security: Security Architecture and Engineering/15 - Asymmetrical Encryption with Email.mp4 23.4 MB
    3 - Information Security: Security Architecture and Engineering/16 - PKI and Revoking Certificates.mp4 18.24 MB
    3 - Information Security: Security Architecture and Engineering/17 - Power Considerations.mp4 15.81 MB
    3 - Information Security: Security Architecture and Engineering/2 - Security Model Fundamentals.mp4 28.45 MB
    3 - Information Security: Security Architecture and Engineering/3 - System Security Requirements.mp4 20.14 MB
    3 - Information Security: Security Architecture and Engineering/4 - Hardware and Firmware Security Capabilities .mp4 26.95 MB
    3 - Information Security: Security Architecture and Engineering/5 - Assessing Vulnerabilities .mp4 21.78 MB
    3 - Information Security: Security Architecture and Engineering/6 - Vulnerabilities in Web-Based Systems.mp4 21.43 MB
    3 - Information Security: Security Architecture and Engineering/7 - Vulnerabilities in Mobile Systems.mp4 19 MB
    3 - Information Security: Security Architecture and Engineering/8 - Vulnerabilities in Embedded Devices.mp4 26.3 MB
    3 - Information Security: Security Architecture and Engineering/9 - Facility Design and Controls.mp4 26.2 MB
    4 - Information Security: Communication and Network Security/1 - OSI and IP Models.mp4 25.04 MB
    4 - Information Security: Communication and Network Security/2 - IP Networking.mp4 28.08 MB
    4 - Information Security: Communication and Network Security/3 - Wi-Fi Security Considerations.mp4 32.85 MB
    4 - Information Security: Communication and Network Security/4 - Network Component Security.mp4 29.04 MB
    4 - Information Security: Communication and Network Security/5 - Virtualized Network Security Considerations.mp4 18.06 MB
    4 - Information Security: Communication and Network Security/6 - Securing Communications Channels.mp4 32 MB
    5 - Information Security: Identity and Access Management (IAM)/1 - Identity Management (IdM).mp4 30.52 MB
    5 - Information Security: Identity and Access Management (IAM)/2 - AAA as Part of Our Controls.mp4 26.43 MB
    5 - Information Security: Identity and Access Management (IAM)/3 - Centralized Authentication with RADIUS.mp4 27.68 MB
    5 - Information Security: Identity and Access Management (IAM)/4 - Using LDAP with Directory Services.mp4 17.24 MB
    5 - Information Security: Identity and Access Management (IAM)/5 - Multi-Factor Authentication Categories.mp4 13.78 MB
    5 - Information Security: Identity and Access Management (IAM)/6 - Biometric Acceptance and Rejection Rates .mp4 20.6 MB
    5 - Information Security: Identity and Access Management (IAM)/7 - Options for Biometric Authentication.mp4 20.52 MB
    5 - Information Security: Identity and Access Management (IAM)/8 - DAC, MAC, and RBAC.mp4 26 MB
    5 - Information Security: Identity and Access Management (IAM)/9 - IAM Provisioning Lifecycle.mp4 33.06 MB
    6 - Information Security: Security Assessment and Testing/1 - Testing, Auditing, and Assessment Overview.mp4 25.52 MB
    6 - Information Security: Security Assessment and Testing/2 - Penetration Testing.mp4 21.68 MB
    6 - Information Security: Security Assessment and Testing/3 - Vulnerability Scans and Assessments.mp4 11.17 MB
    6 - Information Security: Security Assessment and Testing/4 - Reviewing and Testing Code.mp4 25.81 MB
    6 - Information Security: Security Assessment and Testing/5 - Security-Related Data Collection .mp4 27.04 MB
    6 - Information Security: Security Assessment and Testing/6 - Continuous Monitoring.mp4 18.01 MB
    7 - Information Security: Security Operations/1 - Supporting Investigations.mp4 13.53 MB
    7 - Information Security: Security Operations/10 - Incident Response Overview.mp4 25.41 MB
    7 - Information Security: Security Operations/11 - Phases of Incident Handling.mp4 12.58 MB
    7 - Information Security: Security Operations/12 - Improving Security with Configuration Management.mp4 19.21 MB
    7 - Information Security: Security Operations/13 - Patch Management.mp4 20.87 MB
    7 - Information Security: Security Operations/14 - Change Management.mp4 41.94 MB
    7 - Information Security: Security Operations/15 - Comparing IDS and IPS .mp4 17.11 MB
    7 - Information Security: Security Operations/16 - IDS and IPS Detection Methods.mp4 18.25 MB
    7 - Information Security: Security Operations/17 - Network vs Host-Based IDS and IPS.mp4 24.34 MB
    7 - Information Security: Security Operations/18 - IDS and IPS Alarms.mp4 17.28 MB
    7 - Information Security: Security Operations/19 - Traditional and Next-Generation Firewalls.mp4 17.53 MB
    7 - Information Security: Security Operations/2 - Types of Evidence.mp4 17.29 MB
    7 - Information Security: Security Operations/20 - Categorizing Vulnerabilities with CVSS.mp4 14.76 MB
    7 - Information Security: Security Operations/21 - Calculating Vulnerability Scores.mp4 21.33 MB
    7 - Information Security: Security Operations/22 - Honeypots.mp4 22.7 MB
    7 - Information Security: Security Operations/23 - Fault Tolerance for Availability.mp4 18.75 MB
    7 - Information Security: Security Operations/24 - DR and Alternate Sites.mp4 20.44 MB
    7 - Information Security: Security Operations/25 - H_W and S_W Planning for DR.mp4 14.41 MB
    7 - Information Security: Security Operations/26 - Directing and Communicating DR.mp4 24.76 MB
    7 - Information Security: Security Operations/27 - Personnel Safety and Security .mp4 21.72 MB
    7 - Information Security: Security Operations/3 - Chain of Custody.mp4 14.89 MB
    7 - Information Security: Security Operations/4 - Forensics Process.mp4 13.34 MB
    7 - Information Security: Security Operations/5 - Separation of Duties.mp4 19.93 MB
    7 - Information Security: Security Operations/6 - Media Management.mp4 22.32 MB
    7 - Information Security: Security Operations/7 - Backups.mp4 30.78 MB
    7 - Information Security: Security Operations/8 - Logging with Separation of Duties.mp4 29.28 MB
    7 - Information Security: Security Operations/9 - RAID Concepts.mp4 13.56 MB
    8 - Information Security: Software Development Security/1 - Software Development Security.mp4 24.25 MB
    8 - Information Security: Software Development Security/2 - Software Development Life Cycle (SDLC).mp4 27.76 MB
    8 - Information Security: Software Development Security/3 - Change Management.mp4 18.48 MB
    8 - Information Security: Software Development Security/4 - Software Capability Maturity Model (CMMI).mp4 22.98 MB
    8 - Information Security: Software Development Security/5 - Programming Concepts.mp4 27.45 MB
    8 - Information Security: Software Development Security/6 - Programming Methodology.mp4 31.6 MB
    8 - Information Security: Software Development Security/7 - Common Software Vulnerabilities.mp4 33.21 MB
    8 - Information Security: Software Development Security/8 - Web Software Vulnerabilities.mp4 34 MB

Download Info

  • Tips

    “CBTN49” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.