Torrent Info
Title Certified Information Systems Security Professional - CISSP
Category
Size 17.37GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001. Assessment, test, & security audit strategies.en.srt 46.74KB
001. Assessment, test, & security audit strategies.mp4 158.31MB
001. Control physical and logical access to assets.en.srt 45.65KB
001. Control physical and logical access to assets.mp4 206.28MB
001. Engineering process using secure design principles.en.srt 23.30KB
001. Engineering process using secure design principles.mp4 153.97MB
001. Identify and classify information, assets.en.srt 36.32KB
001. Identify and classify information, assets.mp4 160.86MB
001. Overview.en.srt 6.13KB
001. Overview.mp4 26.37MB
001. Spotlight on the OSI Model.en.srt 43.18KB
001. Spotlight on the OSI Model.mp4 159.62MB
001. Spotlight on the Software Development Life Cycle.en.srt 49.98KB
001. Spotlight on the Software Development Life Cycle.mp4 190.49MB
001. Understand and comply with investigations.en.srt 49.93KB
001. Understand and comply with investigations.mp4 197.00MB
001. What is the CISSP Toolbox.en.srt 2.17KB
001. What is the CISSP Toolbox.mp4 13.96MB
002. Certs & Accreditation Verification & Validation.en.srt 30.46KB
002. Certs & Accreditation Verification & Validation.mp4 113.68MB
002. Conduct logging & monitoring activities.en.srt 47.73KB
002. Conduct logging & monitoring activities.mp4 246.74MB
002. Establish information, asset handling requirements.en.srt 46.50KB
002. Establish information, asset handling requirements.mp4 221.07MB
002. Fundamental concepts of security models.en.srt 23.51KB
002. Fundamental concepts of security models.mp4 151.65MB
002. Manage identification and authentication.en.srt 49.28KB
002. Manage identification and authentication.mp4 135.01MB
002. Spotlight on Internet Protocol (IP) networking.en.srt 48.34KB
002. Spotlight on Internet Protocol (IP) networking.mp4 154.92MB
002. Spotlight on System and Org Controls Reports (SOC).en.srt 37.19KB
002. Spotlight on System and Org Controls Reports (SOC).mp4 143.19MB
002. Understand adhere, promote professional ethics.en.srt 21.09KB
002. Understand adhere, promote professional ethics.mp4 72.38MB
002. Who are you.en.srt 8.41KB
002. Who are you.mp4 26.11MB
003. Conduct logging & monitoring activities - threat.en.srt 42.90KB
003. Conduct logging & monitoring activities - threat.mp4 267.72MB
003. Conduct security control testing - the basics.en.srt 50.61KB
003. Conduct security control testing - the basics.mp4 187.86MB
003. Controls based upon system security requirements.en.srt 41.87KB
003. Controls based upon system security requirements.mp4 141.10MB
003. Federated identity with a third-party service.en.srt 47.11KB
003. Federated identity with a third-party service.mp4 203.12MB
003. Provision resources securely.en.srt 31.47KB
003. Provision resources securely.mp4 254.22MB
003. Security in the SDLC - Methodologies.en.srt 50.53KB
003. Security in the SDLC - Methodologies.mp4 197.23MB
003. Spotlight on IPsec.en.srt 48.87KB
003. Spotlight on IPsec.mp4 194.96MB
003. Understand and apply security concepts (CIA).en.srt 36.86KB
003. Understand and apply security concepts (CIA).mp4 189.78MB
003. What does your study plan look like.en.srt 10.41KB
003. What does your study plan look like.mp4 33.94MB
004. Conduct security control testing - the rest.en.srt 54.66KB
004. Conduct security control testing - the rest.mp4 180.92MB
004. Evaluate and apply security governance principles.en.srt 34.13KB
004. Evaluate and apply security governance principles.mp4 165.86MB
004. Implement, manage auth mechanisms - Vocab.en.srt 44.63KB
004. Implement, manage auth mechanisms - Vocab.mp4 230.61MB
004. Manage data lifecycle.en.srt 42.65KB
004. Manage data lifecycle.mp4 150.99MB
004. Perform Configuration Management (CM).en.srt 42.32KB
004. Perform Configuration Management (CM).mp4 275.27MB
004. Security capabilities of Information Systems - vocab.en.srt 46.44KB
004. Security capabilities of Information Systems - vocab.mp4 134.71MB
004. Security in the SDLC - Maturity Models.en.srt 47.15KB
004. Security in the SDLC - Maturity Models.mp4 175.97MB
004. Spotlight on Secure Protocols.en.srt 34.98KB
004. Spotlight on Secure Protocols.mp4 122.92MB
004. What is your timeline.en.mp4 42.04MB
004. What is your timeline.en.srt 13.35KB
005. Apply foundational security operations concepts.en.srt 17.64KB
005. Apply foundational security operations concepts.mp4 55.22MB
005. Collect security process data.en.srt 46.13KB
005. Collect security process data.mp4 166.62MB
005. Determine compliance and other requirements.en.srt 30.41KB
005. Determine compliance and other requirements.mp4 144.28MB
005. Ensure appropriate asset retention.en.srt 38.41KB
005. Ensure appropriate asset retention.mp4 159.94MB
005. Implement, manage auth mechanisms - Models.en.srt 48.86KB
005. Implement, manage auth mechanisms - Models.mp4 306.31MB
005. Implications of converged & multilayer protocols.en.srt 22.92KB
005. Implications of converged & multilayer protocols.mp4 102.82MB
005. Security capabilities of Information Systems - CPU.en.srt 44.12KB
005. Security capabilities of Information Systems - CPU.mp4 222.00MB
005. Security in the SDLC - odds & ends.en.srt 38.10KB
005. Security in the SDLC - odds & ends.mp4 191.64MB
006. Analyze test output and generate reports.en.srt 35.46KB
006. Analyze test output and generate reports.mp4 145.34MB
006. Apply controls in development ecosystems - basics.en.srt 51.29KB
006. Apply controls in development ecosystems - basics.mp4 188.12MB
006. Apply resource protection.en.srt 47.33KB
006. Apply resource protection.mp4 276.24MB
006. Data security controls and compliance requirements.en.srt 48.75KB
006. Data security controls and compliance requirements.mp4 150.86MB
006. Legal, regulatory issues for information security.en.srt 44.84KB
006. Legal, regulatory issues for information security.mp4 238.76MB
006. Manage the identity, access provisioning lifecycle.en.srt 43.30KB
006. Manage the identity, access provisioning lifecycle.mp4 157.18MB
006. Security capabilities of Info Systems - Memory.en.srt 52.82KB
006. Security capabilities of Info Systems - Memory.mp4 288.93MB
006. Spotlight on Micro-segmentation.en.srt 48.65KB
006. Spotlight on Micro-segmentation.mp4 261.35MB
007. Apply controls in development ecosystems - rest.en.srt 41.17KB
007. Apply controls in development ecosystems - rest.mp4 161.60MB
007. Assess and mitigate vulnerabilities - the basics.en.srt 51.72KB
007. Assess and mitigate vulnerabilities - the basics.mp4 291.66MB
007. Assets Security - Key Points.en.srt 39.60KB
007. Assets Security - Key Points.mp4 111.05MB
007. Conduct incident management.en.srt 33.15KB
007. Conduct incident management.mp4 137.32MB
007. Implement authentication systems.en.srt 47.20KB
007. Implement authentication systems.mp4 159.12MB
007. Security Assessment and Testing - Key Points.en.srt 41.32KB
007. Security Assessment and Testing - Key Points.mp4 113.17MB
007. Spotlight on the GDPR.en.srt 46.85KB
007. Spotlight on the GDPR.mp4 247.16MB
007. Wireless, Cellular & Content Distribution Networks.en.srt 49.98KB
007. Wireless, Cellular & Content Distribution Networks.mp4 159.61MB
008. Assess and mitigate vulnerabilities - the rest.en.srt 53.78KB
008. Assess and mitigate vulnerabilities - the rest.mp4 321.12MB
008. Detective & preventative measures.en.srt 50.74KB
008. Detective & preventative measures.mp4 179.31MB
008. Secure Network Components.en.srt 38.58KB
008. Secure Network Components.mp4 167.40MB
008. Spotlight on Kerberos.en.srt 53.47KB
008. Spotlight on Kerberos.mp4 219.41MB
008. Spotlight on the OWASP TOP 10.en.srt 45.07KB
008. Spotlight on the OWASP TOP 10.mp4 164.36MB
008. Understand requirements for investigation types.en.srt 46.61KB
008. Understand requirements for investigation types.mp4 152.53MB
009. Assess the effectiveness of software security.en.srt 51.30KB
009. Assess the effectiveness of software security.mp4 195.31MB
009. Implement Secure Communication Channels.en.srt 48.43KB
009. Implement Secure Communication Channels.mp4 281.14MB
009. Patch & vulnerability management.en.srt 34.54KB
009. Patch & vulnerability management.mp4 159.97MB
009. Security policy, standards, procedures, guidelines.en.srt 30.04KB
009. Security policy, standards, procedures, guidelines.mp4 163.42MB
009. Spotlight on cryptographic solutions - Symmetric.en.srt 49.88KB
009. Spotlight on cryptographic solutions - Symmetric.mp4 204.96MB
009. Spotlight on Federated Identity Management (FIM).en.srt 35.28KB
009. Spotlight on Federated Identity Management (FIM).mp4 259.38MB
010. Assess security impact of acquired software.en.srt 13.68KB
010. Assess security impact of acquired software.mp4 221.01MB
010. Communications & Network Security - Key Points.en.srt 46.84KB
010. Communications & Network Security - Key Points.mp4 127.54MB
010. Identify, analyze, prioritize BC requirements.en.srt 49.19KB
010. Identify, analyze, prioritize BC requirements.mp4 186.57MB
010. Identity Access Management (IAM) - Key Points.en.srt 29.47KB
010. Identity Access Management (IAM) - Key Points.mp4 90.89MB
010. Spotlight on cryptographic solutions - Asymmetric.en.srt 37.54KB
010. Spotlight on cryptographic solutions - Asymmetric.mp4 151.81MB
010. Understand & participate in change management.en.srt 34.32KB
010. Understand & participate in change management.mp4 153.85MB
011. Define, apply secure coding guidelines, standards.en.srt 38.59KB
011. Define, apply secure coding guidelines, standards.mp4 210.04MB
011. Implement recovery strategies.en.srt 47.27KB
011. Implement recovery strategies.mp4 140.65MB
011. Personnel security policies and procedures.en.srt 39.47KB
011. Personnel security policies and procedures.mp4 177.73MB
011. Spotlight on cryptographic solutions - PKI & certs.en.srt 45.20KB
011. Spotlight on cryptographic solutions - PKI & certs.mp4 173.25MB
012. Implement Disaster Recovery (DR) processes.en.srt 36.21KB
012. Implement Disaster Recovery (DR) processes.mp4 134.52MB
012. Spotlight on cryptographic solutions - hashing.en.srt 35.87KB
012. Spotlight on cryptographic solutions - hashing.mp4 179.95MB
012. Spotlight on Databases.en.srt 29.87KB
012. Spotlight on Databases.mp4 293.75MB
012. Understand, apply risk management concepts.en.srt 46.95KB
012. Understand, apply risk management concepts.mp4 209.62MB
013. Cryptographic solutions - digital signing.en.srt 32.38KB
013. Cryptographic solutions - digital signing.mp4 144.30MB
013. Software Development Security - Key Points.en.srt 28.90KB
013. Software Development Security - Key Points.mp4 108.21MB
013. Spotlight on the Risk Management Framework.en.srt 33.06KB
013. Spotlight on the Risk Management Framework.mp4 95.13MB
013. Test Disaster Recovery Plans (DRP).en.srt 32.71KB
013. Test Disaster Recovery Plans (DRP).mp4 132.10MB
014. Business Continuity (BC) planning & exercises.en.srt 26.08KB
014. Business Continuity (BC) planning & exercises.mp4 98.10MB
014. Threat modeling concepts and methodologies.en.srt 42.00KB
014. Threat modeling concepts and methodologies.mp4 154.32MB
014. Understand methods of cryptanalytic attacks.en.srt 45.90KB
014. Understand methods of cryptanalytic attacks.mp4 155.41MB
015. Apply Supply Chain Risk Management (SCRM) concepts.en.srt 45.20KB
015. Apply Supply Chain Risk Management (SCRM) concepts.mp4 177.80MB
015. Implement and manage physical security.en.srt 50.81KB
015. Implement and manage physical security.mp4 195.10MB
015. Security principles for site and facility design.en.srt 44.50KB
015. Security principles for site and facility design.mp4 241.43MB
016. Address personnel safety and security concerns.en.srt 37.06KB
016. Address personnel safety and security concerns.mp4 210.26MB
016. Design site and facility security controls.en.srt 50.84KB
016. Design site and facility security controls.mp4 305.78MB
016. Security awareness, education, and training program.en.srt 24.60KB
016. Security awareness, education, and training program.mp4 116.98MB
017. Security and Risk Management Key Points.en.srt 31.40KB
017. Security and Risk Management Key Points.mp4 95.81MB
017. Security Operations - Key points.en.srt 38.71KB
017. Security Operations - Key points.mp4 106.02MB
017. Spotlight on fire control.en.srt 52.84KB
017. Spotlight on fire control.mp4 309.29MB
018. Security Architecture & Engineering - Key Points.en.srt 40.45KB
018. Security Architecture & Engineering - Key Points.mp4 102.14MB
Distribution statistics by country
Russia (RU) 7
Bulgaria (BG) 3
Ukraine (UA) 2
Spain (ES) 1
Czechia (CZ) 1
Kazakhstan (KZ) 1
Thailand (TH) 1
Israel (IL) 1
Total 17
IP List List of IP addresses which were distributed this torrent