|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| 01_01 - Welcome.mp4 |
8.89MB |
| 02_01 - Security modeling tools.mp4 |
45.99MB |
| 03_01 - The CIA triad confidentiality, integrity, and availability.mp4 |
38.44MB |
| 03_02 - Confidentiality.mp4 |
39.10MB |
| 03_03 - Integrity.mp4 |
43.39MB |
| 03_04 - Availability.mp4 |
53.04MB |
| 03_05 - Using the triad.mp4 |
160.78MB |
| 04_01 - MikeDan's solution matrix.mp4 |
125.80MB |
| 05_01 - The information assurance model.mp4 |
57.96MB |
| 05_02 - People.mp4 |
127.46MB |
| 05_03 - Process.mp4 |
106.50MB |
| 05_04 - Technology.mp4 |
119.09MB |
| 05_05 - Applying the information assurance model.mp4 |
144.12MB |
| 06_01 - Introduction to defense in depth.mp4 |
117.42MB |
| 06_02 - Data.mp4 |
70.88MB |
| 06_03 - Application.mp4 |
81.94MB |
| 06_04 - Host.mp4 |
84.97MB |
| 06_05 - Internal network.mp4 |
76.27MB |
| 06_06 - Network perimeter.mp4 |
73.41MB |
| 06_07 - External network.mp4 |
65.24MB |
| 06_08 - Physical encompassing.mp4 |
79.78MB |
| 06_09 - Stewardship encompassing.mp4 |
105.87MB |
| 07_01 - Using the defense in depth model.mp4 |
112.56MB |
| 07_02 - The IT desktop PC.mp4 |
75.27MB |
| 07_03 - The sales user's laptop.mp4 |
88.88MB |
| 07_04 - The typical user's phone.mp4 |
138.14MB |
| 07_05 - The CEO's Android tablet.mp4 |
116.15MB |
| 07_06 - The CEO's iMac.mp4 |
133.05MB |
| 07_07 - The data center server.mp4 |
114.97MB |
| Torrent Downloaded From Katcr.co - Kickasstorrents.txt |
52B |