Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
01 - Business continuity planning.mp4 |
8.03MB |
01 - Business continuity planning.srt |
6.20KB |
01 - Comparing viruses, worms, and Trojans.mp4 |
23.30MB |
01 - Comparing viruses, worms, and Trojans.srt |
9.68KB |
01 - Continuing your studies.mp4 |
6.71MB |
01 - Continuing your studies.srt |
1.15KB |
01 - Cybersecurity adversaries.mp4 |
16.92MB |
01 - Cybersecurity adversaries.srt |
8.48KB |
01 - Denial of service attacks.mp4 |
15.65MB |
01 - Denial of service attacks.srt |
7.74KB |
01 - Disaster recovery planning.mp4 |
14.07MB |
01 - Disaster recovery planning.srt |
8.32KB |
01 - Information security risk management.mp4 |
13.21MB |
01 - Information security risk management.srt |
1.20KB |
01 - Legal and compliance risks.mp4 |
7.41MB |
01 - Legal and compliance risks.srt |
3.79KB |
01 - Managing vendor relationships.mp4 |
12.40MB |
01 - Managing vendor relationships.srt |
7.43KB |
01 - Risk assessment.mp4 |
13.71MB |
01 - Risk assessment.srt |
8.57KB |
01 - Risk treatment options.mp4 |
17.17MB |
01 - Risk treatment options.srt |
7.51KB |
01 - Security awareness training.mp4 |
19.83MB |
01 - Security awareness training.srt |
9.65KB |
01 - Social engineering.mp4 |
16.91MB |
01 - Social engineering.srt |
10.19KB |
01 - What is vulnerability management.mp4 |
16.64MB |
01 - What is vulnerability management.srt |
9.77KB |
02 - Backups.mp4 |
11.13MB |
02 - Backups.srt |
7.78KB |
02 - Business continuity controls.mp4 |
11.09MB |
02 - Business continuity controls.srt |
6.96KB |
02 - Compliance training.mp4 |
13.28MB |
02 - Compliance training.srt |
5.47KB |
02 - Eavesdropping attacks.mp4 |
13.55MB |
02 - Eavesdropping attacks.srt |
7.92KB |
02 - Identify scan targets.mp4 |
13.74MB |
02 - Identify scan targets.srt |
8.56KB |
02 - Impersonation attacks.mp4 |
15.11MB |
02 - Impersonation attacks.srt |
9.98KB |
02 - Malware payloads.mp4 |
20.49MB |
02 - Malware payloads.srt |
10.35KB |
02 - Preventing insider threats.mp4 |
9.82MB |
02 - Preventing insider threats.srt |
4.75KB |
02 - Privacy compliance.mp4 |
8.84MB |
02 - Privacy compliance.srt |
6.12KB |
02 - Quantitative risk assessment.mp4 |
20.06MB |
02 - Quantitative risk assessment.srt |
10.67KB |
02 - Security control selection and implementation.mp4 |
20.06MB |
02 - Security control selection and implementation.srt |
10.67KB |
02 - Vendor agreements.mp4 |
15.62MB |
02 - Vendor agreements.srt |
7.82KB |
02 - What you need to know.mp4 |
1.99MB |
02 - What you need to know.srt |
1.20KB |
03 - Data breaches.mp4 |
6.96MB |
03 - Data breaches.srt |
4.20KB |
03 - DNS attacks.mp4 |
12.59MB |
03 - DNS attacks.srt |
6.27KB |
03 - High availability and fault tolerance.mp4 |
14.59MB |
03 - High availability and fault tolerance.srt |
10.67KB |
03 - Information classification.mp4 |
12.48MB |
03 - Information classification.srt |
6.71KB |
03 - Ongoing risk management.mp4 |
8.80MB |
03 - Ongoing risk management.srt |
4.60KB |
03 - Physical social engineering.mp4 |
11.07MB |
03 - Physical social engineering.srt |
4.64KB |
03 - Restoring backups.mp4 |
7.25MB |
03 - Restoring backups.srt |
4.34KB |
03 - Scan configuration.mp4 |
15.49MB |
03 - Scan configuration.srt |
10.91KB |
03 - Study resources.mp4 |
13.42MB |
03 - Study resources.srt |
2.52KB |
03 - Threat intelligence.mp4 |
11.11MB |
03 - Threat intelligence.srt |
6.44KB |
03 - Understanding backdoors and logic bombs.mp4 |
15.59MB |
03 - Understanding backdoors and logic bombs.srt |
8.14KB |
03 - User habits.mp4 |
9.51MB |
03 - User habits.srt |
6.63KB |
03 - Vendor information management.mp4 |
6.13MB |
03 - Vendor information management.srt |
3.25KB |
04 - Audits and assessments.mp4 |
18.81MB |
04 - Audits and assessments.srt |
10.43KB |
04 - Botnets.mp4 |
9.28MB |
04 - Botnets.srt |
6.05KB |
04 - Disaster recovery sites.mp4 |
12.52MB |
04 - Disaster recovery sites.srt |
6.41KB |
04 - Intellectual property.mp4 |
17.15MB |
04 - Intellectual property.srt |
7.24KB |
04 - Layer 2 attacks.mp4 |
7.10MB |
04 - Layer 2 attacks.srt |
3.83KB |
04 - Measuring compliance and security posture.mp4 |
7.73MB |
04 - Measuring compliance and security posture.srt |
3.48KB |
04 - Risk management frameworks.mp4 |
10.93MB |
04 - Risk management frameworks.srt |
5.91KB |
04 - Scan perspective.mp4 |
12.75MB |
04 - Scan perspective.srt |
8.54KB |
05 - Advanced persistent threats.mp4 |
10.58MB |
05 - Advanced persistent threats.srt |
6.12KB |
05 - Awareness program reviews.mp4 |
3.19MB |
05 - Awareness program reviews.srt |
2.23KB |
05 - Cloud audits.mp4 |
13.23MB |
05 - Cloud audits.srt |
7.01KB |
05 - Network address spoofing.mp4 |
12.03MB |
05 - Network address spoofing.srt |
6.90KB |
05 - Risk visibility and reporting.mp4 |
21.23MB |
05 - Risk visibility and reporting.srt |
8.08KB |
05 - Security Content Automation Protocol (SCAP).mp4 |
6.99MB |
05 - Security Content Automation Protocol (SCAP).srt |
4.32KB |
05 - Testing BCDR plans.mp4 |
10.96MB |
05 - Testing BCDR plans.srt |
6.15KB |
06 - Common Vulnerability Scoring System (CVSS).mp4 |
10.33MB |
06 - Common Vulnerability Scoring System (CVSS).srt |
6.18KB |
06 - Password attacks.mp4 |
32.82MB |
06 - Password attacks.srt |
14.53KB |
07 - Analyzing scan reports.mp4 |
16.16MB |
07 - Analyzing scan reports.srt |
8.99KB |
07 - Password spraying and credential stuffing.mp4 |
6.12MB |
07 - Password spraying and credential stuffing.srt |
3.21KB |
08 - Correlating scan results.mp4 |
7.95MB |
08 - Correlating scan results.srt |
4.44KB |
08 - Watering hole attacks.mp4 |
12.00MB |
08 - Watering hole attacks.srt |
5.74KB |
Bonus Resources.txt |
386B |
Get Bonus Downloads Here.url |
176B |